mirror of
https://github.com/Telecominfraproject/wlan-testing.git
synced 2025-10-30 18:38:06 +00:00
* client isolation base testcases added * client_isolation test-cases added * added all client-isolation test_cases * final changes done for client-isolation test_cases * removed comment lines & print statements * changed lf_test.py, fixtures_2x.py, controller_2x/controller.py files for isolation-config setup * added layer3-cleanup for all test-cases * added l3_cleanup method to lf_tests file * added allure attachments for all test cases * fix- logic realted changes applied and class level markers added. * Added allure attachment for test result * fixed some changes * changed station name list for one suite * increased time.sleep to 45 sec after layer-3 traffic ran for one suite only * changes done in two suits for allure-Text_body information * Added Test_result in allure report in a table formate. * review changes done in controller.py and fixture_2x.py Co-authored-by: anil-tegala <anil.tegala@candelatech.com>
2152 lines
109 KiB
Python
2152 lines
109 KiB
Python
#########################################################################################################
|
|
# Used by Nightly_Sanity
|
|
# This has different types of old_pytest like Single client connectivity, Single_Client_EAP, testrail_retest
|
|
#########################################################################################################
|
|
import datetime
|
|
import sys
|
|
import os
|
|
import time
|
|
import datetime
|
|
from datetime import datetime
|
|
import threading
|
|
|
|
import allure
|
|
import pytest
|
|
import importlib
|
|
|
|
sys.path.append(
|
|
os.path.dirname(
|
|
os.path.realpath(__file__)
|
|
)
|
|
)
|
|
if "libs" not in sys.path:
|
|
sys.path.append(f'../libs')
|
|
for folder in 'py-json', 'py-scripts':
|
|
if folder not in sys.path:
|
|
sys.path.append(f'../../lanforge/lanforge-scripts/{folder}')
|
|
|
|
sys.path.append(f"../lanforge/lanforge-scripts/py-scripts/tip-cicd-sanity")
|
|
|
|
sys.path.append(f'../libs')
|
|
sys.path.append(f'../tools')
|
|
sys.path.append(f'../libs/lanforge/')
|
|
sys.path.append(os.path.join(os.path.abspath("../../../lanforge/lanforge-scripts/")))
|
|
from sta_connect2 import StaConnect2
|
|
import time
|
|
import string
|
|
import random
|
|
import csv
|
|
from datetime import datetime
|
|
from pull_report import Report
|
|
from scp_util import SCP_File
|
|
import pyshark as ps
|
|
|
|
S = 12
|
|
# from eap_connect import EAPConnect
|
|
from test_ipv4_ttls import TTLSTest
|
|
from lf_wifi_capacity_test import WiFiCapacityTest
|
|
from create_station import CreateStation
|
|
import lf_ap_auto_test
|
|
import lf_dataplane_test
|
|
from lf_dataplane_test import DataplaneTest
|
|
from lf_rx_sensitivity_test import RxSensitivityTest
|
|
from lf_ap_auto_test import ApAutoTest
|
|
from csv_to_influx import CSVtoInflux
|
|
# from influx import RecordInflux
|
|
from lf_multipsk import MultiPsk
|
|
from lf_rvr_test import RvrTest
|
|
from attenuator_serial import AttenuatorSerial
|
|
from lf_atten_mod_test import CreateAttenuator
|
|
from lf_mesh_test import MeshTest
|
|
from LANforge.lfcli_base import LFCliBase
|
|
from lf_tr398_test import TR398Test
|
|
from lf_pcap import LfPcap
|
|
from sta_scan_test import StaScan
|
|
from lf_sniff_radio import SniffRadio
|
|
|
|
cv_test_reports = importlib.import_module("py-json.cv_test_reports")
|
|
lf_report = cv_test_reports.lanforge_reports
|
|
realm = importlib.import_module("py-json.realm")
|
|
cv_test_reports = importlib.import_module("py-json.cv_test_reports")
|
|
lf_report = cv_test_reports.lanforge_reports
|
|
Realm = realm.Realm
|
|
from LANforge import LFUtils
|
|
from lf_cleanup import lf_clean
|
|
from wifi_monitor_profile import WifiMonitor
|
|
from sta_scan_test import StaScan
|
|
from lf_sniff_radio import SniffRadio
|
|
cv_test_reports = importlib.import_module("py-json.cv_test_reports")
|
|
lf_report = cv_test_reports.lanforge_reports
|
|
from lf_pcap import LfPcap
|
|
from lf_hard_roam_test import HardRoam
|
|
from lf_csv import lf_csv
|
|
|
|
|
|
@allure.step
|
|
def nested_step_allure(bssid, rssi):
|
|
pass
|
|
|
|
|
|
|
|
class RunTest:
|
|
|
|
def __init__(self, configuration_data=None, local_report_path="../reports/", influx_params=None, run_lf=False, debug=False, skip_pcap=False):
|
|
if "type" in configuration_data['traffic_generator']["details"].keys():
|
|
if configuration_data['traffic_generator']["details"]["type"] == "mesh":
|
|
self.lanforge_ip = configuration_data['traffic_generator']['details']["ip"]
|
|
self.lanforge_port = configuration_data['traffic_generator']['details']["port"]
|
|
self.ssh_port = configuration_data['traffic_generator']['details']["ssh_port"]
|
|
self.upstream_port_1 = configuration_data['traffic_generator']['details']["upstream-mobile-sta"]
|
|
self.upstream_port_2 = configuration_data['traffic_generator']['details']["upstream-root"]
|
|
self.upstream_port_3 = configuration_data['traffic_generator']['details']["upstream-node-1"]
|
|
self.upstream_port_4 = configuration_data['traffic_generator']['details']["upstream-node-2"]
|
|
self.uplink_port_1 = configuration_data['traffic_generator']['details']["uplink-mobile-sta"]
|
|
self.uplink_port_2 = configuration_data['traffic_generator']['details']["uplink-root"]
|
|
self.uplink_port_3 = configuration_data['traffic_generator']['details']["uplink--node-1"]
|
|
self.uplink_port_4 = configuration_data['traffic_generator']['details']["uplink--node-2"]
|
|
self.upstream_resource_1 = self.upstream_port_1.split(".")[0] + "." + self.upstream_port_1.split(".")[1]
|
|
self.upstream_resource_2 = self.upstream_port_2.split(".")[0] + "." + self.upstream_port_2.split(".")[1]
|
|
self.upstream_resource_3 = self.upstream_port_3.split(".")[0] + "." + self.upstream_port_3.split(".")[1]
|
|
self.upstream_resource_4 = self.upstream_port_4.split(".")[0] + "." + self.upstream_port_4.split(".")[1]
|
|
self.uplink_resource_1 = self.uplink_port_1.split(".")[0] + "." + self.uplink_port_1.split(".")[1]
|
|
self.uplink_resource_2 = self.uplink_port_2.split(".")[0] + "." + self.uplink_port_2.split(".")[1]
|
|
self.uplink_resource_3 = self.uplink_port_3.split(".")[0] + "." + self.uplink_port_3.split(".")[1]
|
|
self.uplink_resource_4 = self.uplink_port_4.split(".")[0] + "." + self.uplink_port_4.split(".")[1]
|
|
self.upstream_subnet = configuration_data['traffic_generator']['details']["upstream_subnet-mobile-sta"]
|
|
self.lf_ssh_port = configuration_data['traffic_generator']['details']["ssh_port"]
|
|
print("hi", self.lanforge_port)
|
|
self.local_report_path = local_report_path
|
|
|
|
else:
|
|
self.lanforge_ip = configuration_data['traffic_generator']['details']["ip"]
|
|
self.lanforge_port = configuration_data['traffic_generator']['details']["port"]
|
|
self.lanforge_ssh_port = configuration_data['traffic_generator']['details']["ssh_port"]
|
|
self.twog_radios = configuration_data['traffic_generator']['details']["2.4G-Radio"]
|
|
self.fiveg_radios = configuration_data['traffic_generator']['details']["5G-Radio"]
|
|
self.ax_radios = configuration_data['traffic_generator']['details']["AX-Radio"]
|
|
self.upstream_port = configuration_data['traffic_generator']['details']["upstream"].split(".")[2]
|
|
self.upstream = configuration_data['traffic_generator']['details']["upstream"]
|
|
self.upstream_resource = configuration_data['traffic_generator']['details']["upstream"].split(".")[1]
|
|
self.twog_prefix = configuration_data['traffic_generator']['details']["2.4G-Station-Name"]
|
|
self.fiveg_prefix = configuration_data['traffic_generator']['details']["5G-Station-Name"]
|
|
self.ax_prefix = configuration_data['traffic_generator']['details']["AX-Station-Name"]
|
|
self.debug = debug
|
|
self.run_lf = run_lf
|
|
self.skip_pcap = skip_pcap
|
|
if self.run_lf:
|
|
self.ssid_data = configuration_data['access_point'][0]['ssid']
|
|
self.lf_ssh_port = configuration_data['traffic_generator']['details']["ssh_port"]
|
|
self.staConnect = None
|
|
self.dataplane_obj = None
|
|
self.rx_sensitivity_obj = None
|
|
self.dualbandptest_obj = None
|
|
self.msthpt_obj = None
|
|
self.cvtest_obj = None
|
|
self.pcap_obj = None
|
|
self.influx_params = influx_params
|
|
# self.influxdb = RecordInflux(_influx_host=influx_params["influx_host"],
|
|
# _influx_port=influx_params["influx_port"],
|
|
# _influx_org=influx_params["influx_org"],
|
|
# _influx_token=influx_params["influx_token"],
|
|
# _influx_bucket=influx_params["influx_bucket"])
|
|
self.local_report_path = local_report_path
|
|
if not os.path.exists(self.local_report_path):
|
|
os.mkdir(self.local_report_path)
|
|
|
|
def Client_Connectivity(self, ssid="[BLANK]", passkey="[BLANK]", security="open", extra_securities=[],
|
|
station_name=[], mode="BRIDGE", vlan_id=1, band="twog", ssid_channel=None):
|
|
"""SINGLE CLIENT CONNECTIVITY using test_connect2.py"""
|
|
self.staConnect = StaConnect2(self.lanforge_ip, self.lanforge_port, debug_=self.debug)
|
|
|
|
self.staConnect.sta_mode = 0
|
|
self.staConnect.upstream_resource = self.upstream_resource
|
|
if mode == "BRIDGE":
|
|
self.staConnect.upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.staConnect.upstream_port = self.upstream_port
|
|
else:
|
|
self.staConnect.upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
if band == "twog":
|
|
if self.run_lf:
|
|
ssid = self.ssid_data["2g-ssid"]
|
|
passkey = self.ssid_data["2g-password"]
|
|
security = self.ssid_data["2g-encryption"].lower()
|
|
print(ssid)
|
|
self.staConnect.radio = self.twog_radios[0]
|
|
self.staConnect.admin_down(self.staConnect.radio)
|
|
self.staConnect.admin_up(self.staConnect.radio)
|
|
self.staConnect.sta_prefix = self.twog_prefix
|
|
if band == "fiveg":
|
|
if self.run_lf:
|
|
ssid = self.ssid_data["5g-ssid"]
|
|
passkey = self.ssid_data["5g-password"]
|
|
security = self.ssid_data["5g-encryption"].lower()
|
|
self.staConnect.radio = self.fiveg_radios[0]
|
|
self.staConnect.reset_port(self.staConnect.radio)
|
|
self.staConnect.sta_prefix = self.fiveg_prefix
|
|
self.set_radio_channel(radio=self.staConnect.radio, channel=ssid_channel)
|
|
print("scan ssid radio", self.staConnect.radio.split(".")[2])
|
|
self.data_scan_ssid = self.scan_ssid(radio=self.staConnect.radio.split(".")[2])
|
|
print("ssid scan data :- ", self.data_scan_ssid)
|
|
result = self.check_ssid_available_scan_result(scan_ssid_data=self.data_scan_ssid, ssid=ssid)
|
|
print("ssid available:-", result)
|
|
if not result and ssid_channel:
|
|
if not self.skip_pcap:
|
|
print("sniff radio", self.ax_radios[0].split(".")[2])
|
|
self.start_sniffer(radio_channel=ssid_channel, radio=self.ax_radios[0].split(".")[2], duration=30)
|
|
time.sleep(30)
|
|
self.stop_sniffer()
|
|
print("ssid not available in scan result")
|
|
return "FAIL", "ssid not available in scan result"
|
|
self.staConnect.resource = 1
|
|
self.staConnect.dut_ssid = ssid
|
|
self.staConnect.dut_passwd = passkey
|
|
self.staConnect.dut_security = security
|
|
self.staConnect.station_names = station_name
|
|
self.staConnect.runtime_secs = 40
|
|
self.staConnect.bringup_time_sec = 80
|
|
self.staConnect.cleanup_on_exit = True
|
|
data_table = ""
|
|
dict_table = {}
|
|
self.staConnect.setup(extra_securities=extra_securities)
|
|
for sta_name in self.staConnect.station_names:
|
|
try:
|
|
sta_url = self.staConnect.get_station_url(sta_name)
|
|
station_info = self.staConnect.json_get(sta_url)
|
|
dict_data = station_info["interface"]
|
|
dict_table[""] = list(dict_data.keys())
|
|
dict_table["Before"] = list(dict_data.values())
|
|
except Exception as e:
|
|
print(e)
|
|
if ssid_channel:
|
|
if not self.skip_pcap:
|
|
print("sniff radio", self.ax_radios[0].split(".")[2])
|
|
self.start_sniffer(radio_channel=ssid_channel, radio=self.ax_radios[0].split(".")[2], duration=30)
|
|
self.staConnect.start()
|
|
print("napping %f sec" % self.staConnect.runtime_secs)
|
|
time.sleep(self.staConnect.runtime_secs)
|
|
report_obj = Report()
|
|
for sta_name in self.staConnect.station_names:
|
|
try:
|
|
sta_url = self.staConnect.get_station_url(sta_name)
|
|
station_info = self.staConnect.json_get(sta_url)
|
|
self.station_ip = station_info["interface"]["ip"]
|
|
dict_data = station_info["interface"]
|
|
dict_table["After"] = list(dict_data.values())
|
|
try:
|
|
data_table = report_obj.table2(table=dict_table, headers='keys')
|
|
except Exception as e:
|
|
print(e)
|
|
allure.attach(name=str(sta_name), body=data_table)
|
|
except Exception as e:
|
|
print(e)
|
|
self.staConnect.stop()
|
|
run_results = self.staConnect.get_result_list()
|
|
if not self.staConnect.passes():
|
|
if self.debug:
|
|
for result in run_results:
|
|
print("test result: " + result)
|
|
pytest.exit("Test Failed: Debug True")
|
|
self.staConnect.cleanup()
|
|
try:
|
|
supplicant = "/home/lanforge/wifi/wpa_supplicant_log_" + self.staConnect.radio.split(".")[2] + ".txt"
|
|
obj = SCP_File(ip=self.lanforge_ip, port=self.lanforge_ssh_port, username="root", password="lanforge",
|
|
remote_path=supplicant,
|
|
local_path=".")
|
|
obj.pull_file()
|
|
allure.attach.file(source="wpa_supplicant_log_" + self.staConnect.radio.split(".")[2] + ".txt",
|
|
name="supplicant_log")
|
|
except Exception as e:
|
|
print(e)
|
|
|
|
for result in run_results:
|
|
print("test result: " + result)
|
|
result = "PASS"
|
|
description = "Unknown error"
|
|
dict_table = {}
|
|
print("Client Connectivity :", self.staConnect.passes)
|
|
endp_data = []
|
|
for i in self.staConnect.resulting_endpoints:
|
|
endp_data.append(self.staConnect.resulting_endpoints[i]["endpoint"])
|
|
dict_table["key"] = [i for s in [d.keys() for d in endp_data] for i in s]
|
|
dict_table["value"] = [i for s in [d.values() for d in endp_data] for i in s]
|
|
data_table = report_obj.table2(table=dict_table, headers='keys')
|
|
allure.attach(name="cx_data", body=data_table)
|
|
for i in range(len(run_results)):
|
|
if i == 0:
|
|
if "FAILED" in run_results[i]:
|
|
result = "FAIL"
|
|
description = "Station did not get an ip"
|
|
break
|
|
else:
|
|
if "FAILED" in run_results[i]:
|
|
result = "FAIL"
|
|
description = "did not report traffic"
|
|
|
|
if self.staConnect.passes():
|
|
print("client connection to", self.staConnect.dut_ssid, "successful. Test Passed")
|
|
result = "PASS"
|
|
else:
|
|
print("client connection to", self.staConnect.dut_ssid, "unsuccessful. Test Failed")
|
|
result = "FAIL"
|
|
time.sleep(3)
|
|
if ssid_channel:
|
|
if not self.skip_pcap:
|
|
self.stop_sniffer()
|
|
self.set_radio_channel(radio=self.staConnect.radio, channel="AUTO")
|
|
return result, description
|
|
|
|
def EAP_Connect(self, ssid="[BLANK]", passkey="[BLANK]", security="wpa2", extra_securities=[],
|
|
mode="BRIDGE", band="twog", vlan_id=100,
|
|
station_name=[], key_mgmt="WPA-EAP",
|
|
pairwise="NA", group="NA", wpa_psk="DEFAULT",
|
|
ttls_passwd="nolastart", ieee80211w=1,
|
|
wep_key="NA", ca_cert="NA", eap="TTLS", identity="nolaradius", d_vlan=False, cleanup=True,
|
|
ssid_channel=None):
|
|
self.eap_connect = TTLSTest(host=self.lanforge_ip, port=self.lanforge_port,
|
|
sta_list=station_name, vap=False, _debug_on=self.debug)
|
|
|
|
self.eap_connect.station_profile.sta_mode = 0
|
|
self.eap_connect.upstream_resource = self.upstream_resource
|
|
self.eap_connect.l3_cx_obj_udp.upstream_resource = self.upstream_resource
|
|
self.eap_connect.l3_cx_obj_tcp.upstream_resource = self.upstream_resource
|
|
if mode == "BRIDGE":
|
|
self.eap_connect.l3_cx_obj_udp.upstream = self.upstream_port
|
|
self.eap_connect.l3_cx_obj_tcp.upstream = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.eap_connect.l3_cx_obj_udp.upstream = self.upstream_port
|
|
self.eap_connect.l3_cx_obj_tcp.upstream = self.upstream_port
|
|
else:
|
|
self.eap_connect.l3_cx_obj_udp.upstream = self.upstream_port + "." + str(vlan_id)
|
|
self.eap_connect.l3_cx_obj_tcp.upstream = self.upstream_port + "." + str(vlan_id)
|
|
if band == "twog":
|
|
if self.run_lf:
|
|
ssid = self.ssid_data["2g-ssid"]
|
|
passkey = self.ssid_data["2g-password"]
|
|
security = self.ssid_data["2g-encryption"]
|
|
self.eap_connect.radio = self.twog_radios[0]
|
|
self.eap_connect.admin_down(self.eap_connect.radio)
|
|
self.eap_connect.admin_up(self.eap_connect.radio)
|
|
# self.eap_connect.sta_prefix = self.twog_prefix
|
|
if band == "fiveg":
|
|
if self.run_lf:
|
|
ssid = self.ssid_data["5g-ssid"]
|
|
passkey = self.ssid_data["5g-password"]
|
|
security = self.ssid_data["5g-encryption"]
|
|
self.eap_connect.radio = self.fiveg_radios[0]
|
|
self.eap_connect.admin_down(self.eap_connect.radio)
|
|
self.eap_connect.admin_up(self.eap_connect.radio)
|
|
# self.eap_connect.sta_prefix = self.fiveg_prefix
|
|
# self.eap_connect.resource = 1
|
|
self.set_radio_channel(radio=self.eap_connect.radio, channel=ssid_channel)
|
|
print("scan ssid radio", self.eap_connect.radio.split(".")[2])
|
|
self.data_scan_ssid = self.scan_ssid(radio=self.eap_connect.radio.split(".")[2])
|
|
print("ssid scan data :- ", self.data_scan_ssid)
|
|
result = self.check_ssid_available_scan_result(scan_ssid_data=self.data_scan_ssid, ssid=ssid)
|
|
print("ssid available:-", result)
|
|
if not result and ssid_channel:
|
|
if not self.skip_pcap:
|
|
print("sniff radio", self.ax_radios[0].split(".")[2])
|
|
self.start_sniffer(radio_channel=ssid_channel, radio=self.ax_radios[0].split(".")[2], duration=30)
|
|
time.sleep(30)
|
|
self.stop_sniffer()
|
|
print("ssid not available in scan result")
|
|
return "FAIL", "ssid not available in scan result"
|
|
if eap == "TTLS":
|
|
self.eap_connect.ieee80211w = ieee80211w
|
|
self.eap_connect.key_mgmt = key_mgmt
|
|
self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
|
self.eap_connect.identity = identity
|
|
self.eap_connect.ttls_passwd = ttls_passwd
|
|
self.eap_connect.pairwise = pairwise
|
|
self.eap_connect.group = group
|
|
if eap == "TLS":
|
|
self.eap_connect.key_mgmt = key_mgmt
|
|
self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
|
self.eap_connect.eap = eap
|
|
self.eap_connect.identity = "user"
|
|
self.eap_connect.ttls_passwd = "password"
|
|
self.eap_connect.private_key = "/home/lanforge/client.p12"
|
|
self.eap_connect.ca_cert = "/home/lanforge/ca.pem"
|
|
self.eap_connect.pk_passwd = "whatever"
|
|
self.eap_connect.ieee80211w = 1
|
|
|
|
# self.eap_connect.hs20_enable = False
|
|
self.eap_connect.ssid = ssid
|
|
self.eap_connect.password = passkey
|
|
self.eap_connect.security = security
|
|
self.eap_connect.sta_list = station_name
|
|
self.eap_connect.build(extra_securities=extra_securities)
|
|
dict_table = {}
|
|
report_obj = Report()
|
|
data_table = ""
|
|
for sta_name in station_name:
|
|
try:
|
|
station_info = self.eap_connect.json_get("port/1/1/" + sta_name)
|
|
dict_data = station_info["interface"]
|
|
dict_table[""] = list(dict_data.keys())
|
|
dict_table["Before"] = list(dict_data.values())
|
|
except Exception as e:
|
|
print(e)
|
|
if ssid_channel:
|
|
if not self.skip_pcap:
|
|
print("sniff radio", self.ax_radios[0].split(".")[2])
|
|
self.start_sniffer(radio_channel=ssid_channel, radio=self.ax_radios[0].split(".")[2], duration=30)
|
|
self.eap_connect.start(station_name, True, True)
|
|
if d_vlan:
|
|
self.station_ip = {}
|
|
for sta_name in station_name:
|
|
# try:
|
|
station_data_str = ""
|
|
# sta_url = self.eap_connect.get_station_url(sta_name)
|
|
# station_info = self.eap_connect.json_get(sta_url)
|
|
station_info = self.eap_connect.json_get("port/1/1/" + sta_name)
|
|
|
|
if d_vlan:
|
|
if "ip" in station_info["interface"].keys():
|
|
self.station_ip[sta_name] = station_info["interface"]["ip"]
|
|
dict_data = station_info["interface"]
|
|
dict_table["After"] = list(dict_data.values())
|
|
try:
|
|
data_table = report_obj.table2(table=dict_table, headers='keys')
|
|
except Exception as e:
|
|
print(e)
|
|
allure.attach(name=str(sta_name), body=data_table)
|
|
# except Exception as e:
|
|
# print(e)
|
|
|
|
self.eap_connect.stop()
|
|
run_results = self.eap_connect.get_result_list()[1:]
|
|
try:
|
|
supplicant = "/home/lanforge/wifi/wpa_supplicant_log_" + self.eap_connect.radio.split(".")[2] + ".txt"
|
|
obj = SCP_File(ip=self.lanforge_ip, port=self.lanforge_ssh_port, username="root", password="lanforge",
|
|
remote_path=supplicant,
|
|
local_path=".")
|
|
obj.pull_file()
|
|
allure.attach.file(source="wpa_supplicant_log_" + self.eap_connect.radio.split(".")[2] + ".txt",
|
|
name="supplicant_log")
|
|
except Exception as e:
|
|
print(e)
|
|
|
|
if not self.eap_connect.passes():
|
|
if self.debug:
|
|
#print("test result: " + self.eap_connect.passes())
|
|
pytest.exit("Test Failed: Debug True")
|
|
endp_data = []
|
|
result = "PASS"
|
|
description = "Unknown error"
|
|
dict_table = {}
|
|
for i in self.eap_connect.resulting_endpoints:
|
|
endp_data.append(self.eap_connect.resulting_endpoints[i]["endpoint"])
|
|
# finding all keys and values
|
|
dict_table["key"] = [i for s in [d.keys() for d in endp_data] for i in s]
|
|
dict_table["value"] = [i for s in [d.values() for d in endp_data] for i in s]
|
|
data_table = report_obj.table2(table=dict_table, headers='keys')
|
|
allure.attach(name="cx_data", body=data_table)
|
|
for i in range(len(run_results)):
|
|
if i == 0:
|
|
if "FAILED" in run_results[i]:
|
|
result = "FAIL"
|
|
description = "Station did not get an ip"
|
|
break
|
|
else:
|
|
if "FAILED" in run_results[i]:
|
|
result = "FAIL"
|
|
description = "did not report traffic"
|
|
if cleanup:
|
|
self.eap_connect.cleanup(station_name)
|
|
if self.eap_connect.passes():
|
|
result = "PASS"
|
|
else:
|
|
result = "FAIL"
|
|
if ssid_channel:
|
|
if not self.skip_pcap:
|
|
self.stop_sniffer()
|
|
self.set_radio_channel(radio=self.eap_connect.radio, channel="AUTO")
|
|
return result, description
|
|
|
|
def wifi_capacity(self, mode="BRIDGE", vlan_id=100, batch_size="1,5,10,20,40,64,128",
|
|
instance_name="wct_instance", download_rate="1Gbps", influx_tags="",
|
|
upload_rate="1Gbps", protocol="TCP-IPv4", duration="60000", stations="", create_stations=True,
|
|
sort="interleave", raw_lines=[], sets=[], move_to_influx=False):
|
|
instance_name = ''.join(random.choices(string.ascii_uppercase + string.digits, k=S))
|
|
if mode == "BRIDGE":
|
|
upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
upstream_port = self.upstream_port
|
|
elif mode == "VLAN":
|
|
upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
'''SINGLE WIFI CAPACITY using lf_wifi_capacity.py'''
|
|
wificapacity_obj = WiFiCapacityTest(lfclient_host=self.lanforge_ip,
|
|
lf_port=self.lanforge_port,
|
|
ssh_port=self.lf_ssh_port,
|
|
lf_user="lanforge",
|
|
lf_password="lanforge",
|
|
local_lf_report_dir=self.local_report_path,
|
|
instance_name=instance_name,
|
|
config_name="wifi_config",
|
|
upstream="1.1." + upstream_port,
|
|
batch_size=batch_size,
|
|
loop_iter="1",
|
|
protocol=protocol,
|
|
duration=duration,
|
|
pull_report=True,
|
|
load_old_cfg=False,
|
|
upload_rate=upload_rate,
|
|
download_rate=download_rate,
|
|
sort=sort,
|
|
stations=stations,
|
|
create_stations=create_stations,
|
|
radio=None,
|
|
security=None,
|
|
paswd=None,
|
|
ssid=None,
|
|
enables=[],
|
|
disables=[],
|
|
raw_lines=raw_lines,
|
|
raw_lines_file="",
|
|
test_tag=influx_tags,
|
|
sets=sets)
|
|
wificapacity_obj.setup()
|
|
wificapacity_obj.run()
|
|
if move_to_influx:
|
|
try:
|
|
report_name = "../reports/" + wificapacity_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
|
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
|
influx_port=self.influx_params["influx_port"],
|
|
influx_org=self.influx_params["influx_org"],
|
|
influx_token=self.influx_params["influx_token"],
|
|
influx_bucket=self.influx_params["influx_bucket"],
|
|
path=report_name)
|
|
|
|
influx.glob()
|
|
except Exception as e:
|
|
print(e)
|
|
pass
|
|
return wificapacity_obj
|
|
|
|
def Client_Connect(self, ssid="[BLANK]", passkey="[BLANK]", security="wpa2", mode="BRIDGE", band="twog",
|
|
vlan_id=100,
|
|
station_name=[], scan_ssid=True):
|
|
if band == "twog":
|
|
if self.run_lf:
|
|
ssid = self.ssid_data["2g-ssid"]
|
|
passkey = self.ssid_data["2g-password"]
|
|
security = self.ssid_data["2g-encryption"].lower()
|
|
if band == "fiveg":
|
|
if self.run_lf:
|
|
ssid = self.ssid_data["5g-ssid"]
|
|
passkey = self.ssid_data["5g-password"]
|
|
security = self.ssid_data["5g-encryption"].lower()
|
|
self.client_connect = CreateStation(_host=self.lanforge_ip, _port=self.lanforge_port,
|
|
_sta_list=station_name, _password=passkey, _ssid=ssid, _security=security)
|
|
self.client_connect.station_profile.sta_mode = 0
|
|
self.client_connect.upstream_resource = self.upstream_resource
|
|
if mode == "BRIDGE":
|
|
self.client_connect.upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.client_connect.upstream_port = self.upstream_port
|
|
else:
|
|
self.client_connect.upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
if band == "twog":
|
|
self.client_connect.radio = self.twog_radios[0]
|
|
# self.client_connect.sta_prefix = self.twog_prefix
|
|
if band == "fiveg":
|
|
self.client_connect.radio = self.fiveg_radios[0]
|
|
if band == "ax":
|
|
self.client_connect.radio = self.ax_radios[0]
|
|
print("scan ssid radio", self.client_connect.radio.split(".")[2])
|
|
if scan_ssid:
|
|
self.data_scan_ssid = self.scan_ssid(radio=self.client_connect.radio.split(".")[2])
|
|
print("ssid scan data :- ", self.data_scan_ssid)
|
|
self.client_connect.build()
|
|
result = self.client_connect.wait_for_ip(station_list=station_name, timeout_sec=100)
|
|
#print(self.client_connect.wait_for_ip(station_name))
|
|
print(result)
|
|
if result:
|
|
self.client_connect._pass("ALL Stations got IP's", print_=True)
|
|
return self.client_connect
|
|
else:
|
|
return False
|
|
|
|
def allure_report_table_format(self, dict_data=None, key=None, value=None, name=None):#, value_on_same_table=True):
|
|
# for i in range(len(name)):
|
|
report_obj = Report()
|
|
data_table, dict_table = "", {}
|
|
# if value_on_same_table:
|
|
dict_table[key] = list(dict_data.keys())
|
|
# for i in range(len(dict_data)):
|
|
# if value_on_same_table == False:
|
|
# dict_table[key[i]] = list(dict_data[i].keys())
|
|
dict_table[value] = list(dict_data.values())
|
|
try:
|
|
data_table = report_obj.table2(table=dict_table, headers='keys')
|
|
except Exception as e:
|
|
print(e)
|
|
if name != None:
|
|
allure.attach(name=name, body=str(data_table))
|
|
|
|
def attach_stationdata_to_allure(self, station_name=[], name=""):
|
|
self.sta_url_map = None
|
|
for sta_name_ in station_name:
|
|
if sta_name_ is None:
|
|
raise ValueError("get_station_url wants a station name")
|
|
if self.sta_url_map is None:
|
|
self.sta_url_map = {}
|
|
for sta_name in station_name:
|
|
self.sta_url_map[sta_name] = "port/1/%s/%s" % (str(1), sta_name)
|
|
print(self.sta_url_map)
|
|
|
|
for sta_name in station_name:
|
|
try:
|
|
station_data_str = ""
|
|
# sta_url = self.staConnect.get_station_url(sta_name)
|
|
cli_base = LFCliBase(_lfjson_host=self.lanforge_ip, _lfjson_port=self.lanforge_port, )
|
|
station_info = cli_base.json_get(_req_url=self.sta_url_map[sta_name])
|
|
print("station info", station_info)
|
|
for i in station_info["interface"]:
|
|
try:
|
|
station_data_str = station_data_str + i + " : " + str(station_info["interface"][i]) + "\n"
|
|
except Exception as e:
|
|
print(e)
|
|
print("sta name", sta_name)
|
|
if name == "":
|
|
allure.attach(name=f"{sta_name} info", body=str(station_data_str))
|
|
else:
|
|
allure.attach(name=name, body=str(station_data_str))
|
|
except Exception as e:
|
|
print(e)
|
|
|
|
def Client_Connect_Using_Radio(self, ssid="[BLANK]", passkey="[BLANK]", security="wpa2", mode="BRIDGE",
|
|
vlan_id=100, radio=None, sta_mode=0,
|
|
station_name=[]):
|
|
self.client_connect = CreateStation(_host=self.lanforge_ip, _port=self.lanforge_port, _mode=sta_mode,
|
|
_sta_list=station_name, _password=passkey, _ssid=ssid, _security=security)
|
|
|
|
# self.client_connect.station_profile.sta_mode = sta_mode
|
|
self.client_connect.upstream_resource = 1
|
|
if mode == "BRIDGE":
|
|
self.client_connect.upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.client_connect.upstream_port = self.upstream_port
|
|
else:
|
|
self.client_connect.upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
|
|
self.client_connect.radio = radio
|
|
self.client_connect.build()
|
|
self.client_connect.wait_for_ip(station_name)
|
|
print(self.client_connect.wait_for_ip(station_name))
|
|
if self.client_connect.wait_for_ip(station_name):
|
|
self.client_connect._pass("ALL Stations got IP's", print_=True)
|
|
return self.client_connect
|
|
else:
|
|
return False
|
|
|
|
def wait_for_ip(self, station=[]):
|
|
self.local_realm = realm.Realm(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port)
|
|
print(station)
|
|
if self.local_realm.wait_for_ip(station_list=station):
|
|
self.local_realm._pass("ALL Stations got IP's", print_=True)
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def Client_disconnect(self, station_name=[], clean_l3_traffic=False, clear_all_sta = False):
|
|
self.client_dis = CreateStation(_host=self.lanforge_ip, _port=self.lanforge_port,
|
|
_sta_list=station_name, _password="passkey", _ssid="ssid", _security="security")
|
|
if len(station_name) > 0:
|
|
self.client_dis.station_profile.cleanup(station_name)
|
|
elif clear_all_sta:
|
|
exist_sta = []
|
|
for u in self.client_dis.json_get("/port/?fields=port+type,alias")['interfaces']:
|
|
if list(u.values())[0]['port type'] not in ['Ethernet', 'WIFI-Radio', 'NA']:
|
|
exist_sta.append(list(u.values())[0]['alias'])
|
|
self.client_dis.station_profile.cleanup(desired_stations=exist_sta)
|
|
if clean_l3_traffic:
|
|
try:
|
|
exist_l3 = list(
|
|
filter(lambda cx_name: cx_name if (cx_name != 'handler' and cx_name != 'uri') else False,
|
|
self.client_dis.json_get("/cx/?fields=name")))
|
|
list(map(lambda i: self.client_dis.rm_cx(cx_name=i), exist_l3))
|
|
list(map(lambda cx_name: [self.client_dis.rm_endp(ename=i) for i in [f"{cx_name}-A", f"{cx_name}-B"]],
|
|
exist_l3))
|
|
except Exception as e:
|
|
pass
|
|
return True
|
|
|
|
def dataplane(self, station_name=None, mode="BRIDGE", vlan_id=100, download_rate="85%", dut_name="TIP",
|
|
upload_rate="0", duration="15s", instance_name="test_demo", raw_lines=None, influx_tags="",
|
|
move_to_influx=False):
|
|
instance_name = ''.join(random.choices(string.ascii_uppercase + string.digits, k=S))
|
|
|
|
if mode == "BRIDGE":
|
|
upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
|
|
upstream_port = self.upstream_port
|
|
elif mode == "VLAN":
|
|
# self.upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
|
|
if raw_lines is None:
|
|
raw_lines = [['pkts: 60;142;256;512;1024;MTU;4000'], ['directions: DUT Transmit;DUT Receive'],
|
|
['traffic_types: UDP;TCP'],
|
|
["show_3s: 1"], ["show_ll_graphs: 1"], ["show_log: 1"]]
|
|
self.client_connect.upstream_port = upstream_port
|
|
elif mode == "VLAN":
|
|
self.client_connect.upstream_port = upstream_port + "." + str(vlan_id)
|
|
|
|
if raw_lines is None:
|
|
raw_lines = [['pkts: 60;142;256;512;1024;MTU;4000'], ['directions: DUT Transmit;DUT Receive'],
|
|
['traffic_types: UDP;TCP'],
|
|
["show_3s: 1"], ["show_ll_graphs: 1"], ["show_log: 1"]]
|
|
|
|
self.dataplane_obj = DataplaneTest(lf_host=self.lanforge_ip,
|
|
lf_port=self.lanforge_port,
|
|
ssh_port=self.lf_ssh_port,
|
|
local_lf_report_dir=self.local_report_path,
|
|
lf_user="lanforge",
|
|
lf_password="lanforge",
|
|
instance_name=instance_name,
|
|
config_name="dpt_config",
|
|
upstream="1.1." + upstream_port,
|
|
pull_report=True,
|
|
load_old_cfg=False,
|
|
download_speed=download_rate,
|
|
upload_speed=upload_rate,
|
|
duration=duration,
|
|
dut=dut_name,
|
|
station="1.1." + station_name[0],
|
|
test_tag=influx_tags,
|
|
raw_lines=raw_lines)
|
|
|
|
self.dataplane_obj.setup()
|
|
self.dataplane_obj.run()
|
|
if move_to_influx:
|
|
report_name = "../reports/" + self.dataplane_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
|
try:
|
|
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
|
influx_port=self.influx_params["influx_port"],
|
|
influx_org=self.influx_params["influx_org"],
|
|
influx_token=self.influx_params["influx_token"],
|
|
influx_bucket=self.influx_params["influx_bucket"],
|
|
path=report_name)
|
|
|
|
influx.glob()
|
|
except Exception as e:
|
|
print(e)
|
|
pass
|
|
|
|
return self.dataplane_obj
|
|
|
|
def dualbandperformancetest(self, ssid_5G="[BLANK]", ssid_2G="[BLANK]", mode="BRIDGE", vlan_id=100, dut_name="TIP",
|
|
instance_name="test_demo", dut_5g="", dut_2g="", influx_tags="", move_to_influx=False):
|
|
instance_name = ''.join(random.choices(string.ascii_uppercase + string.digits, k=S))
|
|
|
|
if mode == "BRIDGE":
|
|
self.upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.upstream_port = self.upstream_port
|
|
else:
|
|
self.upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
|
|
self.dualbandptest_obj = ApAutoTest(lf_host=self.lanforge_ip,
|
|
lf_port=self.lanforge_port,
|
|
lf_user="lanforge",
|
|
lf_password="lanforge",
|
|
ssh_port=self.lf_ssh_port,
|
|
instance_name=instance_name,
|
|
config_name="dbp_config",
|
|
upstream="1.1." + self.upstream_port,
|
|
pull_report=True,
|
|
dut5_0=dut_5g,
|
|
dut2_0=dut_2g,
|
|
load_old_cfg=False,
|
|
local_lf_report_dir=self.local_report_path,
|
|
max_stations_2=64,
|
|
max_stations_5=64,
|
|
max_stations_dual=124,
|
|
radio2=[self.twog_radios],
|
|
radio5=[self.fiveg_radios],
|
|
test_tag=influx_tags,
|
|
sets=[['Basic Client Connectivity', '0'], ['Multi Band Performance', '1'],
|
|
['Throughput vs Pkt Size', '0'], ['Capacity', '0'],
|
|
['Skip 2.4Ghz Tests', '1'],
|
|
['Skip 5Ghz Tests', '1'],
|
|
['Stability', '0'],
|
|
['Band-Steering', '0'], ['Multi-Station Throughput vs Pkt Size', '0'],
|
|
['Long-Term', '0']]
|
|
)
|
|
self.dualbandptest_obj.setup()
|
|
self.dualbandptest_obj.run()
|
|
if move_to_influx:
|
|
report_name = "../reports/" + self.dualbandptest_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
|
try:
|
|
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
|
influx_port=self.influx_params["influx_port"],
|
|
influx_org=self.influx_params["influx_org"],
|
|
influx_token=self.influx_params["influx_token"],
|
|
influx_bucket=self.influx_params["influx_bucket"],
|
|
path=report_name)
|
|
|
|
influx.glob()
|
|
except Exception as e:
|
|
print(e)
|
|
pass
|
|
return self.dualbandptest_obj
|
|
|
|
def apstabilitytest(self, ssid_5G="[BLANK]", ssid_2G="[BLANK]", mode="BRIDGE", vlan_id=100, dut_name="TIP",
|
|
instance_name="test_demo", dut_5g="", dut_2g=""):
|
|
instance_name = ''.join(random.choices(string.ascii_uppercase + string.digits, k=S))
|
|
|
|
if mode == "BRIDGE":
|
|
self.upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.upstream_port = self.upstream_port
|
|
else:
|
|
self.upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
|
|
self.apstab_obj = ApAutoTest(lf_host=self.lanforge_ip,
|
|
lf_port=self.lanforge_port,
|
|
lf_user="lanforge",
|
|
lf_password="lanforge",
|
|
instance_name=instance_name,
|
|
config_name="dbp_config",
|
|
upstream="1.1." + self.upstream_port,
|
|
pull_report=True,
|
|
dut5_0=dut_5g,
|
|
dut2_0=dut_2g,
|
|
load_old_cfg=False,
|
|
local_lf_report_dir=self.local_report_path,
|
|
max_stations_2=5,
|
|
max_stations_5=5,
|
|
max_stations_dual=10,
|
|
radio2=[self.twog_radios],
|
|
radio5=[self.fiveg_radios],
|
|
sets=[['Basic Client Connectivity', '0'], ['Multi Band Performance', '0'],
|
|
['Throughput vs Pkt Size', '0'], ['Capacity', '0'],
|
|
['Stability', '1'],
|
|
['Band-Steering', '0'], ['Multi-Station Throughput vs Pkt Size', '0'],
|
|
['Long-Term', '0']],
|
|
raw_lines=[['reset_dur:300'], ['reset_batch_size:2']]
|
|
)
|
|
self.apstab_obj.setup()
|
|
self.apstab_obj.run()
|
|
report_name = self.apstab_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
|
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
|
influx_port=self.influx_params["influx_port"],
|
|
influx_org=self.influx_params["influx_org"],
|
|
influx_token=self.influx_params["influx_token"],
|
|
influx_bucket=self.influx_params["influx_bucket"],
|
|
path=report_name)
|
|
|
|
influx.glob()
|
|
return self.apstab_obj
|
|
|
|
def ratevsrange(self, station_name=None, mode="BRIDGE", vlan_id=100, download_rate="85%", dut_name="TIP",
|
|
upload_rate="0", duration="1m", instance_name="test_demo", raw_lines=None):
|
|
if mode == "BRIDGE":
|
|
self.client_connect.upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.client_connect.upstream_port = self.upstream_port
|
|
elif mode == "VLAN":
|
|
self.client_connect.upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
|
|
self.rvr_obj = RvrTest(lf_host=self.lanforge_ip,
|
|
lf_port=self.lanforge_port,
|
|
ssh_port=self.lf_ssh_port,
|
|
lf_user="lanforge",
|
|
local_lf_report_dir=self.local_report_path,
|
|
lf_password="lanforge",
|
|
instance_name=instance_name,
|
|
config_name="rvr_config",
|
|
upstream="1.1." + self.upstream_port,
|
|
pull_report=True,
|
|
load_old_cfg=False,
|
|
upload_speed=upload_rate,
|
|
download_speed=download_rate,
|
|
duration=duration,
|
|
station="1.1." + station_name[0],
|
|
dut=dut_name,
|
|
raw_lines=raw_lines)
|
|
self.rvr_obj.setup()
|
|
self.rvr_obj.run()
|
|
report_name = self.rvr_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
|
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
|
influx_port=self.influx_params["influx_port"],
|
|
influx_org=self.influx_params["influx_org"],
|
|
influx_token=self.influx_params["influx_token"],
|
|
influx_bucket=self.influx_params["influx_bucket"],
|
|
path=report_name)
|
|
|
|
influx.glob()
|
|
return self.rvr_obj
|
|
|
|
def rx_sensitivity(self, station_name=None, mode="BRIDGE", vlan_id=100, download_rate="100%", dut_name="TIP",
|
|
upload_rate="0kbps", duration="30s", instance_name="test_demo", raw_lines=None):
|
|
if mode == "BRIDGE":
|
|
self.client_connect.upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.client_connect.upstream_port = self.upstream_port
|
|
else:
|
|
self.client_connect.upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
if raw_lines is None:
|
|
raw_lines = [['txo_preamble: VHT'],
|
|
['txo_mcs: 4 OFDM, HT, VHT;5 OFDM, HT, VHT;6 OFDM, HT, VHT;7 OFDM, HT, VHT'],
|
|
['spatial_streams: 3'], ['bandw_options: 80'], ['txo_sgi: ON'],
|
|
['txo_retries: No Retry'], ["show_3s: 1"], ['txo_txpower: 17'],
|
|
["show_ll_graphs: 1"], ["show_log: 1"]]
|
|
|
|
self.rx_sensitivity_obj = RxSensitivityTest(lf_host=self.lanforge_ip,
|
|
lf_port=self.lanforge_port,
|
|
ssh_port=self.lf_ssh_port,
|
|
local_path=self.local_report_path,
|
|
lf_user="lanforge",
|
|
lf_password="lanforge",
|
|
instance_name=instance_name,
|
|
config_name="rx_sen_config",
|
|
upstream="1.1." + self.upstream_port,
|
|
pull_report=True,
|
|
load_old_cfg=False,
|
|
download_speed=download_rate,
|
|
upload_speed=upload_rate,
|
|
duration=duration,
|
|
dut=dut_name,
|
|
station="1.1." + station_name[0],
|
|
raw_lines=raw_lines)
|
|
self.rx_sensitivity_obj.setup()
|
|
self.rx_sensitivity_obj.run()
|
|
report_name = self.rx_sensitivity_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
|
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
|
influx_port=self.influx_params["influx_port"],
|
|
influx_org=self.influx_params["influx_org"],
|
|
influx_token=self.influx_params["influx_token"],
|
|
influx_bucket=self.influx_params["influx_bucket"],
|
|
path=report_name)
|
|
|
|
influx.glob()
|
|
return self.rx_sensitivity_obj
|
|
|
|
def multipsk(self, ssid="[BLANK]", security=None, mode=None, key1=None, vlan_id=None, key2=None, band="twog",
|
|
station_name=None, n_vlan="1", key3=None):
|
|
global result1, sta_name
|
|
if mode == "BRIDGE":
|
|
self.upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.upstream_port = self.upstream_port
|
|
if band == "twog":
|
|
radio = self.twog_radios[0]
|
|
elif band == "fiveg":
|
|
radio = self.fiveg_radios[0]
|
|
print("vlan id", vlan_id)
|
|
|
|
if n_vlan == "1":
|
|
input_data = [{
|
|
"password": key1,
|
|
"upstream": str(self.upstream_port) + "." + str(vlan_id[0]),
|
|
"mac": "",
|
|
"num_station": 1,
|
|
"radio": str(radio)
|
|
},
|
|
{
|
|
"password": key2,
|
|
"upstream": str(self.upstream_port),
|
|
"mac": "",
|
|
"num_station": 1,
|
|
"radio": str(radio)
|
|
},
|
|
]
|
|
else:
|
|
input_data = [{
|
|
"password": key1,
|
|
"upstream": str(self.upstream_port) + "." + str(vlan_id[0]),
|
|
"mac": "",
|
|
"num_station": 1,
|
|
"radio": str(radio)
|
|
},
|
|
{
|
|
"password": key2,
|
|
"upstream": str(self.upstream_port) + "." + str(vlan_id[1]),
|
|
"mac": "",
|
|
"num_station": 1,
|
|
"radio": str(radio)
|
|
},
|
|
{
|
|
"password": key3,
|
|
"upstream": str(self.upstream_port),
|
|
"mac": "",
|
|
"num_station": 1,
|
|
"radio": str(radio)
|
|
},
|
|
]
|
|
print("station name", station_name)
|
|
|
|
self.multi_obj = MultiPsk(host=self.lanforge_ip,
|
|
port=self.lanforge_port,
|
|
ssid=ssid,
|
|
input=input_data,
|
|
security=security,
|
|
resource=int(self.upstream_resource))
|
|
self.sta_url_map = None
|
|
self.multi_obj.build()
|
|
self.multi_obj.start()
|
|
time.sleep(60)
|
|
self.multi_obj.monitor_vlan_ip()
|
|
if n_vlan == "1":
|
|
self.multi_obj.get_sta_ip()
|
|
else:
|
|
self.multi_obj.get_sta_ip_for_more_vlan()
|
|
|
|
result = self.multi_obj.compare_ip()
|
|
print("checking for vlan ips")
|
|
if result == "Pass":
|
|
print("VLAN check Passed")
|
|
else:
|
|
print("VLAN check Failed")
|
|
print("now checking ip for non vlan port")
|
|
self.multi_obj.monitor_non_vlan_ip()
|
|
self.multi_obj.get_non_vlan_sta_ip()
|
|
print("mode", mode)
|
|
result, result1 = "Pass", "Pass"
|
|
if mode == "BRIDGE":
|
|
result = self.multi_obj.compare_nonvlan_ip_bridge()
|
|
elif mode == "NAT":
|
|
result = self.multi_obj.compare_nonvlan_ip_nat()
|
|
# station_name = ['sta100', 'sta200', 'sta00']
|
|
cli_base = LFCliBase(_lfjson_host=self.lanforge_ip, _lfjson_port=self.lanforge_port)
|
|
res_data = cli_base.json_get(_req_url='port?fields=alias,port+type,ip,mac',)['interfaces']
|
|
table_heads = ["station name", "configured vlan-id", "expected IP Range", "allocated IP", "mac address", 'pass/fail']
|
|
table_data = []
|
|
temp = {'sta100':'', 'sta200': '', 'sta00': ''}
|
|
for i in res_data:
|
|
for item in i:
|
|
if i[item]['port type'] == 'Ethernet' and i[item]['alias'] == self.upstream_port:
|
|
if mode == 'NAT':
|
|
temp.update({'sta00': '192.168.1.1'})
|
|
else:
|
|
temp.update({'sta00': i[item]['ip']})
|
|
if i[item]['port type'] == '802.1Q VLAN' and i[item]['alias'] == str(self.upstream_port+".100"):
|
|
temp.update({'sta100': i[item]['ip']})
|
|
elif i[item]['port type'] == '802.1Q VLAN' and i[item]['alias'] == str(self.upstream_port+".200"):
|
|
temp.update({'sta200': i[item]['ip']})
|
|
for i in res_data:
|
|
for item in i:
|
|
if i[item]['port type'] == 'WIFI-STA' and i[item]['alias'] == "sta100":
|
|
exp1 = temp['sta100'].split('.')
|
|
ip1 = i[item]['ip'].split('.')
|
|
if exp1[0] == ip1[0] and exp1[1] == ip1[1]:
|
|
pf = 'PASS'
|
|
else:
|
|
pf = 'FAIL'
|
|
result1 = 'Fail'
|
|
table_data.append([i[item]['alias'], '100', f'{exp1[0]}.{exp1[1]}.X.X', i[item]['ip'], i[item]['mac'],
|
|
f'{pf}'])
|
|
elif i[item]['port type'] == 'WIFI-STA' and i[item]['alias'] == 'sta200':
|
|
exp2 = temp['sta200'].split('.')
|
|
ip2 = i[item]['ip'].split('.')
|
|
if exp2[0] == ip2[0] and exp2[1] == ip2[1]:
|
|
pf = 'PASS'
|
|
else:
|
|
pf = 'FAIL'
|
|
result1 = 'Fail'
|
|
table_data.append([i[item]['alias'], '200', f'{exp2[0]}.{exp2[1]}.X.X', i[item]['ip'], i[item]['mac'], f'{pf}'])
|
|
elif i[item]['port type'] == 'WIFI-STA' and i[item]['alias'] == 'sta00':
|
|
exp3 = temp['sta00'].split('.')
|
|
ip2 = i[item]['ip'].split('.')
|
|
if mode == "BRIDGE":
|
|
if exp3[0] == ip2[0] and exp3[1] == ip2[1]:
|
|
pf = 'PASS'
|
|
else:
|
|
pf = 'FAIL'
|
|
result1 = 'Fail'
|
|
table_data.append([i[item]['alias'], 'WAN upstream', f'{exp3[0]}.{exp3[1]}.X.X', i[item]['ip'], i[item]['mac'], f'{pf}'])
|
|
elif mode == "NAT":
|
|
if exp3[0] == '192' and exp3[1] == '168':
|
|
pf = 'PASS'
|
|
else:
|
|
pf = 'FAIL'
|
|
result1 = 'Fail'
|
|
table_data.append([i[item]['alias'], 'LAN upstream', f'192.168.X.X', i[item]['ip'], i[item]['mac'], f'{pf}'])
|
|
print(table_data)
|
|
# attach test data in a table to allure
|
|
report_obj = Report()
|
|
table_info = report_obj.table2(table=table_data, headers=table_heads)
|
|
allure.attach(name="Test Results Info", body=table_info)
|
|
|
|
if result1 == "Pass":
|
|
print("Test passed for non vlan ip ")
|
|
else:
|
|
print("Test failed for non vlan ip")
|
|
print("clean up")
|
|
self.multi_obj.postcleanup()
|
|
if result1 == "Pass":
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def multi_sta_thpt(self, ssid_5G="[BLANK]", ssid_2G="[BLANK]", mode="BRIDGE", vlan_id=100, dut_name="TIP",
|
|
raw_line=[], instance_name="test_demo", dut_5g="", dut_2g=""):
|
|
|
|
inst_name = instance_name.split('_')[0]
|
|
instance_name = ''.join(random.choices(string.ascii_uppercase + string.digits, k=S))
|
|
|
|
if mode == "BRIDGE":
|
|
self.upstream_port = self.upstream_port
|
|
elif mode == "NAT":
|
|
self.upstream_port = self.upstream_port
|
|
else:
|
|
self.upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
|
|
sets = [['Basic Client Connectivity', '0'], ['Multi Band Performance', '0'],
|
|
['Throughput vs Pkt Size', '0'], ['Capacity', '0'],
|
|
['Stability', '0'],
|
|
['Band-Steering', '0'], ['Multi-Station Throughput vs Pkt Size', '1'],
|
|
['Long-Term', '0']]
|
|
|
|
if len(self.twog_radios) == 1:
|
|
twog_radios = [[self.twog_radios[0]]]
|
|
|
|
elif len(self.twog_radios) > 1:
|
|
twog_radio = []
|
|
for i in range(0, len(self.twog_radios)):
|
|
twog_radio.append([self.twog_radios[i]])
|
|
twog_radios = twog_radio
|
|
|
|
if len(self.fiveg_radios) == 1:
|
|
fiveg_radios = [[self.fiveg_radios[0]]]
|
|
|
|
elif len(self.fiveg_radios) > 1:
|
|
fiveg_radio = []
|
|
for i in range(0, len(self.fiveg_radios)):
|
|
fiveg_radio.append([self.fiveg_radios[i]])
|
|
fiveg_radios = fiveg_radio
|
|
|
|
self.msthpt_obj = ApAutoTest(lf_host=self.lanforge_ip,
|
|
lf_port=self.lanforge_port,
|
|
ssh_port=self.lf_ssh_port,
|
|
|
|
lf_user="lanforge",
|
|
lf_password="lanforge",
|
|
instance_name=instance_name,
|
|
config_name="dbp_config",
|
|
upstream="1.1." + self.upstream_port,
|
|
pull_report=True,
|
|
dut5_0=dut_5g,
|
|
dut2_0=dut_2g,
|
|
load_old_cfg=False,
|
|
local_lf_report_dir=self.local_report_path,
|
|
radio2=twog_radios,
|
|
radio5=fiveg_radios,
|
|
sets=sets,
|
|
raw_lines=raw_line
|
|
)
|
|
self.msthpt_obj.setup()
|
|
self.msthpt_obj.run()
|
|
report_name = self.msthpt_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
|
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
|
influx_port=self.influx_params["influx_port"],
|
|
influx_org=self.influx_params["influx_org"],
|
|
influx_token=self.influx_params["influx_token"],
|
|
influx_bucket=self.influx_params["influx_bucket"],
|
|
path=report_name)
|
|
|
|
influx.glob()
|
|
return self.msthpt_obj
|
|
|
|
def attenuator_serial(self):
|
|
self.obj = AttenuatorSerial(
|
|
lfclient_host=self.lanforge_ip,
|
|
lfclient_port=self.lanforge_port
|
|
)
|
|
val = self.obj.show()
|
|
return val
|
|
|
|
def attenuator_modify(self, serno, idx, val):
|
|
atten_obj = CreateAttenuator(self.lanforge_ip, self.lanforge_port, serno, idx, val)
|
|
atten_obj.build()
|
|
|
|
def mesh_test(self, instance_name=None, raw_lines=None, duration="60s"):
|
|
self.mesh_obj = MeshTest(
|
|
lf_host=self.lanforge_ip,
|
|
lf_port=self.lanforge_port,
|
|
ssh_port=self.lf_ssh_port,
|
|
local_lf_report_dir=self.local_report_path,
|
|
lf_user="lanforge",
|
|
lf_password="lanforge",
|
|
instance_name=instance_name,
|
|
duration=duration,
|
|
config_name="mesh_config",
|
|
upstream="1.2.2 eth2",
|
|
upload_speed="85%",
|
|
download_speed="85%",
|
|
pull_report=True,
|
|
load_old_cfg=False,
|
|
raw_lines=raw_lines,
|
|
)
|
|
self.mesh_obj.setup()
|
|
self.mesh_obj.run()
|
|
return self.mesh_obj
|
|
|
|
def attenuator_serial_2g_radio(self, ssid="[BLANK]", passkey="[BLANK]", security="wpa2", mode="BRIDGE",
|
|
vlan_id=100, sta_mode=0, station_name=[], lf_tools_obj=None):
|
|
radio = self.twog_radios[0]
|
|
# index 0 of atten_serial_radio will ser no of 1st 2g radio and index 1 will ser no of 2nd and 3rd 2g radio
|
|
atten_serial_radio = []
|
|
atten_serial = self.attenuator_serial()
|
|
self.Client_Connect_Using_Radio(ssid=ssid, passkey=passkey, security=security, mode=mode,
|
|
vlan_id=vlan_id, radio=radio, sta_mode=sta_mode,
|
|
station_name=station_name)
|
|
signal1 = lf_tools_obj.station_data_query(station_name=station_name[0], query="signal")
|
|
atten_sr = atten_serial[0].split(".")
|
|
for i in range(4):
|
|
self.attenuator_modify(int(atten_sr[2]), i, 400)
|
|
time.sleep(0.5)
|
|
signal2 = lf_tools_obj.station_data_query(station_name=station_name[0], query="signal")
|
|
if abs(int(signal2.split(" ")[0])) - abs(int(signal1.split(" ")[0])) >= 5:
|
|
atten_serial_radio = atten_serial
|
|
else:
|
|
atten_serial_radio = atten_serial[::-1]
|
|
self.Client_disconnect(station_name=station_name)
|
|
return atten_serial_radio
|
|
|
|
def attenuator_serial_5g_radio(self, ssid="[BLANK]", passkey="[BLANK]", security="wpa2", mode="BRIDGE",
|
|
vlan_id=100, sta_mode=0, station_name=[], lf_tools_obj=None):
|
|
radio = self.fiveg_radios[0]
|
|
# index 0 of atten_serial_radio will ser no of 1st 5g radio and index 1 will ser no of 2nd and 3rd 5g radio
|
|
atten_serial_radio = []
|
|
atten_serial = self.attenuator_serial()
|
|
self.Client_Connect_Using_Radio(ssid=ssid, passkey=passkey, security=security, mode=mode,
|
|
vlan_id=vlan_id, radio=radio, sta_mode=sta_mode,
|
|
station_name=station_name)
|
|
signal1 = lf_tools_obj.station_data_query(station_name=station_name[0], query="signal")
|
|
atten_sr = atten_serial[0].split(".")
|
|
for i in range(4):
|
|
self.attenuator_modify(int(atten_sr[2]), i, 400)
|
|
time.sleep(0.5)
|
|
signal2 = lf_tools_obj.station_data_query(station_name=station_name[0], query="signal")
|
|
if abs(int(signal2.split(" ")[0])) - abs(int(signal1.split(" ")[0])) >= 5:
|
|
atten_serial_radio = atten_serial
|
|
else:
|
|
atten_serial_radio = atten_serial[::-1]
|
|
self.Client_disconnect(station_name=station_name)
|
|
return atten_serial_radio
|
|
|
|
def create_n_clients(self, start_id=0, sta_prefix=None, num_sta=None, dut_ssid=None,
|
|
dut_security=None, dut_passwd=None, band=None, radio=None, lf_tools=None, type=None):
|
|
|
|
local_realm = realm.Realm(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port)
|
|
station_profile = local_realm.new_station_profile()
|
|
if band == "fiveg":
|
|
radio = self.fiveg_radios[0]
|
|
if band == "twog":
|
|
radio = self.twog_radios[0]
|
|
if band == "sixg":
|
|
radio = self.ax_radios[0]
|
|
|
|
# pre clean
|
|
sta_list = lf_tools.get_station_list()
|
|
print(sta_list)
|
|
if not sta_list:
|
|
print("no stations on lanforge")
|
|
else:
|
|
station_profile.cleanup(sta_list, delay=1)
|
|
LFUtils.wait_until_ports_disappear(base_url=local_realm.lfclient_url,
|
|
port_list=sta_list,
|
|
debug=True)
|
|
time.sleep(2)
|
|
print("pre cleanup done")
|
|
|
|
station_list = LFUtils.portNameSeries(prefix_=sta_prefix, start_id_=start_id,
|
|
end_id_=num_sta - 1, padding_number_=10000,
|
|
radio=radio)
|
|
|
|
if type == "11r-sae-802.1x":
|
|
dut_passwd = "[BLANK]"
|
|
station_profile.use_security(dut_security, dut_ssid, dut_passwd)
|
|
station_profile.set_number_template("00")
|
|
|
|
station_profile.set_command_flag("add_sta", "create_admin_down", 1)
|
|
|
|
station_profile.set_command_param("set_port", "report_timer", 1500)
|
|
|
|
# connect station to particular bssid
|
|
# self.station_profile.set_command_param("add_sta", "ap", self.bssid[0])
|
|
|
|
station_profile.set_command_flag("set_port", "rpt_timer", 1)
|
|
if type == "11r":
|
|
station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
|
station_profile.set_command_flag("add_sta", "8021x_radius", 1)
|
|
station_profile.set_command_flag("add_sta", "disable_roam", 1)
|
|
station_profile.set_wifi_extra(key_mgmt="FT-PSK ",
|
|
pairwise="",
|
|
group="",
|
|
psk="",
|
|
eap="",
|
|
identity="",
|
|
passwd="",
|
|
pin=""
|
|
)
|
|
if type == "11r-sae":
|
|
station_profile.set_command_flag("add_sta", "ieee80211w", 2)
|
|
station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
|
station_profile.set_command_flag("add_sta", "8021x_radius", 1)
|
|
station_profile.set_command_flag("add_sta", "disable_roam", 1)
|
|
station_profile.set_wifi_extra(key_mgmt="FT-SAE ",
|
|
pairwise="",
|
|
group="",
|
|
psk="",
|
|
eap="",
|
|
identity="",
|
|
passwd="",
|
|
pin=""
|
|
)
|
|
|
|
if type == "11r-sae-802.1x":
|
|
station_profile.set_command_flag("set_port", "rpt_timer", 1)
|
|
station_profile.set_command_flag("add_sta", "ieee80211w", 2)
|
|
station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
|
station_profile.set_command_flag("add_sta", "8021x_radius", 1)
|
|
station_profile.set_command_flag("add_sta", "disable_roam", 1)
|
|
# station_profile.set_command_flag("add_sta", "ap", "68:7d:b4:5f:5c:3f")
|
|
station_profile.set_wifi_extra(key_mgmt="FT-EAP ",
|
|
pairwise="[BLANK]",
|
|
group="[BLANK]",
|
|
psk="[BLANK]",
|
|
eap="TTLS",
|
|
identity="testuser",
|
|
passwd="testpasswd",
|
|
pin=""
|
|
)
|
|
station_profile.create(radio=radio, sta_names_=station_list)
|
|
local_realm.wait_until_ports_appear(sta_list=station_list)
|
|
station_profile.admin_up()
|
|
if local_realm.wait_for_ip(station_list):
|
|
print("All stations got IPs")
|
|
return True
|
|
else:
|
|
print("Stations failed to get IPs")
|
|
return False
|
|
|
|
def json_get(self, _req_url="/"):
|
|
cli_base = LFCliBase(_lfjson_host=self.lanforge_ip, _lfjson_port=self.lanforge_port, )
|
|
json_response = cli_base.json_get(_req_url=_req_url)
|
|
return json_response
|
|
|
|
def l3_cleanup(self):
|
|
local_realm = realm.Realm(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port)
|
|
local_realm.remove_all_cxs(remove_all_endpoints=True)
|
|
|
|
def create_layer3(self, side_a_min_rate, side_a_max_rate, side_b_min_rate, side_b_max_rate,
|
|
traffic_type, sta_list, side_b=""):
|
|
# checked
|
|
if side_b=="":
|
|
side_b=self.upstream
|
|
print(sta_list)
|
|
print(type(sta_list))
|
|
print(side_b)
|
|
print(type(side_b))
|
|
local_realm = realm.Realm(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port)
|
|
cx_profile = local_realm.new_l3_cx_profile()
|
|
cx_profile.host = self.lanforge_ip
|
|
cx_profile.port = self.lanforge_port
|
|
layer3_cols = ['name', 'tx bytes', 'rx bytes', 'tx rate', 'rx rate']
|
|
cx_profile.side_a_min_bps = side_a_min_rate
|
|
cx_profile.side_a_max_bps = side_a_max_rate
|
|
cx_profile.side_b_min_bps = side_b_min_rate
|
|
cx_profile.side_b_max_bps = side_b_max_rate
|
|
|
|
# create
|
|
cx_profile.create(endp_type=traffic_type, side_a=sta_list,
|
|
side_b=side_b,
|
|
sleep_time=0)
|
|
cx_profile.start_cx()
|
|
|
|
def get_cx_list(self):
|
|
local_realm = realm.Realm(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port)
|
|
layer3_result = local_realm.cx_list()
|
|
layer3_names = [item["name"] for item in layer3_result.values() if "_links" in item]
|
|
print(layer3_names)
|
|
return layer3_names
|
|
|
|
|
|
def get_layer3_values(self, cx_name=None, query=None):
|
|
url = f"/cx/{cx_name}"
|
|
response = self.json_get(_req_url=url)
|
|
result = response[str(cx_name)][str(query)]
|
|
return result
|
|
|
|
|
|
def crete_file_attach(self, bssid,rssi, rx_rate, rx_bytes, rx_packets, cx_time, filename, name ):
|
|
try:
|
|
filename = filename
|
|
with open(filename, 'w') as f:
|
|
lines = ["bssid: " + str(bssid), 'rssi: ' + str(rssi), "rx rate: " + str(rx_rate),
|
|
"rx packets: " + str(rx_packets), "rx bytes: " + str(rx_bytes), "connection time: " + str(cx_time)]
|
|
for line in lines:
|
|
f.write(line)
|
|
f.write('\n')
|
|
allure.attach.file(name=str(name), source=str(filename))
|
|
except FileNotFoundError:
|
|
print("The 'docs' directory does not exist")
|
|
|
|
|
|
def hard_roam(self, run_lf, instantiate_profile, lf_tools, lf_reports, get_configuration, test=None, band=None, num_sta=1,
|
|
security=None, security_key=None, iteration=1, ssid_name=None,
|
|
roaming_delay=None, option=None, channel=36, duration=None, duration_based=False,
|
|
iteration_based=True, dut_name=None, identity=None, ttls_pass=None):
|
|
allure.attach(name="Test Procedure", body="This test consists of creating a multiple client which will be " \
|
|
" connected to the nearest ap, here the test automation will " \
|
|
"do hard roam based on forced roam method" \
|
|
"check if client performed roam by monitoring client bssid, for n number of iterions")
|
|
allure.attach(name="Pass Fail Criteria",
|
|
body="Test is said to be pass if it satisfy 4 criterias as - 1 after roam bssid should change , 2- reassociation respone should be present, 3- auth request should be present, 4- roaming time should be less then 50 ms " \
|
|
"other wise the test is said to be failed ")
|
|
|
|
# attaching 11r log before tart of test
|
|
instantiate_profile_obj = instantiate_profile(controller_data=get_configuration['controller'],
|
|
timeout="10",
|
|
ap_data=get_configuration['access_point'],
|
|
type=0)
|
|
log = instantiate_profile_obj.show_11r_log()
|
|
|
|
# get bssid from ap for 2g and 5g
|
|
radio = ""
|
|
c1_bssid = ""
|
|
c2_bssid = ""
|
|
if test == "2g":
|
|
c1_2g_bssid = ""
|
|
c2_2g_bssid = ""
|
|
if run_lf:
|
|
c1_2g_bssid = get_configuration["access_point"][0]["ssid"]["2g-bssid"]
|
|
allure.attach(name="bssid of ap1", body=c1_2g_bssid)
|
|
c2_2g_bssid = get_configuration["access_point"][1]["ssid"]["2g-bssid"]
|
|
allure.attach(name="bssid of ap2", body=c2_2g_bssid)
|
|
|
|
else:
|
|
# instantiate controller class and check bssid's for each ap in testbed
|
|
for ap_name in range(len(get_configuration['access_point'])):
|
|
instantiate_profile_obj = instantiate_profile(controller_data=get_configuration['controller'],
|
|
timeout="10",
|
|
ap_data=get_configuration['access_point'],
|
|
type=ap_name)
|
|
bssid_2g = instantiate_profile_obj.cal_bssid_2g()
|
|
if ap_name == 0:
|
|
c1_2g_bssid = bssid_2g
|
|
if ap_name == 1:
|
|
c2_2g_bssid = bssid_2g
|
|
c1_bssid = c1_2g_bssid
|
|
c2_bssid = c2_2g_bssid
|
|
elif test == "5g":
|
|
c1_5g_bssid = ""
|
|
c2_5g_bssid = ""
|
|
if run_lf:
|
|
c1_5g_bssid = get_configuration["access_point"][0]["ssid"]["5g-bssid"]
|
|
allure.attach(name="bssid of ap1", body=c1_5g_bssid)
|
|
c2_5g_bssid = get_configuration["access_point"][1]["ssid"]["5g-bssid"]
|
|
allure.attach(name="bssid of ap2", body=c2_5g_bssid)
|
|
else:
|
|
for ap_name in range(len(get_configuration['access_point'])):
|
|
instantiate_profile_obj = instantiate_profile(controller_data=get_configuration['controller'],
|
|
timeout="10",
|
|
ap_data=get_configuration['access_point'],
|
|
type=ap_name)
|
|
bssid_5g = instantiate_profile_obj.cal_bssid_5g()
|
|
if ap_name == 0:
|
|
c1_5g_bssid = bssid_5g
|
|
if ap_name == 1:
|
|
c2_5g_bssid = bssid_5g
|
|
c1_bssid = c1_5g_bssid
|
|
c2_bssid = c2_5g_bssid
|
|
|
|
elif test == "6g":
|
|
c1_6g_bssid = ""
|
|
c2_6g_bssid = ""
|
|
if run_lf:
|
|
c1_6g_bssid = get_configuration["access_point"][0]["ssid"]["6g-bssid"]
|
|
allure.attach(name="bssid of ap1", body=c1_6g_bssid)
|
|
c2_6g_bssid = get_configuration["access_point"][1]["ssid"]["6g-bssid"]
|
|
allure.attach(name="bssid of ap2", body=c2_6g_bssid)
|
|
else:
|
|
for ap_name in range(len(get_configuration['access_point'])):
|
|
instantiate_profile_obj = instantiate_profile(controller_data=get_configuration['controller'],
|
|
timeout="10",
|
|
ap_data=get_configuration['access_point'],
|
|
type=ap_name)
|
|
bssid_6g = instantiate_profile_obj.cal_bssid_6g()
|
|
if ap_name == 0:
|
|
c1_6g_bssid = bssid_6g
|
|
if ap_name == 1:
|
|
c2_6g_bssid = bssid_6g
|
|
c1_bssid = c1_6g_bssid
|
|
c2_bssid = c2_6g_bssid
|
|
|
|
print("bssid of c1 ", c1_bssid)
|
|
allure.attach(name="bssid of ap1", body=c1_bssid)
|
|
print("bssid of c2", c2_bssid)
|
|
allure.attach(name="bssid of ap2", body=c2_bssid)
|
|
allure.attach(name="11r logs before roam test", body=str(log))
|
|
fiveg_radio, sixg_radio, twog_radio, sniff_radio = None, None, None, None
|
|
supplicant_radio = None
|
|
if band == "twog":
|
|
twog_radio = self.twog_radios[0]
|
|
supplicant_radio = twog_radio.split(".")[2]
|
|
radio_ = self.ax_radios[0]
|
|
sniff_radio = radio_.split(".")[2]
|
|
if band == "fiveg":
|
|
fiveg_radio = self.fiveg_radios[0]
|
|
supplicant_radio = fiveg_radio.split(".")[2]
|
|
radio_ = self.ax_radios[0]
|
|
sniff_radio = radio_.split(".")[2]
|
|
if band == "sixg":
|
|
sixg_radio = self.ax_radios[1]
|
|
supplicant_radio = sixg_radio.split(".")[2]
|
|
radio_ = self.ax_radios[2]
|
|
sniff_radio = radio_.split(".")[2]
|
|
obj = HardRoam(lanforge_ip=self.lanforge_ip,
|
|
lanforge_port=self.lanforge_port,
|
|
lanforge_ssh_port = 22,
|
|
c1_bssid=c1_bssid,
|
|
c2_bssid=c2_bssid,
|
|
fiveg_radio=fiveg_radio,
|
|
twog_radio=twog_radio,
|
|
sixg_radio=sixg_radio,
|
|
band=band,
|
|
sniff_radio=sniff_radio,
|
|
num_sta=num_sta,
|
|
security=security,
|
|
security_key=security_key,
|
|
ssid=ssid_name,
|
|
upstream=self.upstream,
|
|
duration=duration,
|
|
iteration=iteration,
|
|
channel=channel,
|
|
option=option,
|
|
duration_based=duration_based,
|
|
iteration_based=iteration_based,
|
|
dut_name = dut_name,
|
|
traffic_type="lf_udp",
|
|
path="../lanforge/lanforge-scripts",
|
|
scheme="ssh",
|
|
dest="localhost",
|
|
user="admin",
|
|
passwd="Cisco123",
|
|
prompt="WLC2",
|
|
series_cc="9800",
|
|
ap="AP687D.B45C.1D1C",
|
|
port="8888",
|
|
band_cc="5g",
|
|
timeout="40",
|
|
identity = identity,
|
|
ttls_pass = ttls_pass
|
|
)
|
|
x = os.getcwd()
|
|
print(x)
|
|
file = obj.generate_csv()
|
|
kernel, message = obj.run(file_n=file)
|
|
allure.attach(name="message", body=str(message))
|
|
# file = ["test_client_0.csv"]
|
|
report_dir_name = obj.generate_report(csv_list=file, kernel_lst=kernel, current_path=str(x) + "/tests")
|
|
print(report_dir_name)
|
|
lf_csv_obj = lf_csv()
|
|
for i, y in zip(file, range(len(file))):
|
|
data = lf_csv_obj.read_csv_row(file_name=str(x) + "/" + str(report_dir_name) + "/csv_data/" + str(i))
|
|
tab = lf_reports.table2(table=data)
|
|
allure.attach(name="client " + str(y) + " table", body=str(tab))
|
|
# report_dir_name = "2022-04-30-18-51-07_Hard Roam Test"
|
|
relevant_path = report_dir_name + "/"
|
|
entries = os.listdir(report_dir_name + "/")
|
|
pdf = None
|
|
for i in entries:
|
|
if ".pdf" in i:
|
|
pdf = i
|
|
allure.attach.file(source=relevant_path + pdf, name="hard_roam_report")
|
|
instantiate_profile_obj = instantiate_profile(controller_data=get_configuration['controller'],
|
|
timeout="10",
|
|
ap_data=get_configuration['access_point'],
|
|
type=0)
|
|
z = instantiate_profile_obj.show_wireless_client_detail()
|
|
allure.attach(name="wireless client details", body=str(z))
|
|
log = instantiate_profile_obj.show_11r_log()
|
|
allure.attach(name="11r logs after roam test", body=str(log))
|
|
allure.attach(name="test_result_folder", body=str(report_dir_name))
|
|
try:
|
|
supplicant = "/home/lanforge/wifi/wpa_supplicant_log_" + supplicant_radio + ".txt"
|
|
obj = SCP_File(ip=self.lanforge_ip, port=self.lanforge_ssh_port, username="root", password="lanforge",
|
|
remote_path=supplicant,
|
|
local_path=relevant_path)
|
|
obj.pull_file()
|
|
# obj.ssh_connect(command="journalctl --since '1 hour ago' > kernel_log.txt")
|
|
# kernel_log = "/home/lanforge/kernel_log.txt"
|
|
# obj1 = SCP_File(ip=self.lanforge_ip, port=self.lanforge_ssh_port, username="root", password="lanforge",
|
|
# remote_path=kernel_log,
|
|
# local_path=relevant_path)
|
|
# obj1.pull_file()
|
|
allure.attach.file(source=relevant_path + "/wpa_supplicant_log_" + supplicant_radio + ".txt",
|
|
name="supplicant_log")
|
|
except Exception as e:
|
|
print(e)
|
|
|
|
def set_radio_country_channel(self,_radio="wiphy0",_channel=0,_country_num=840,): # 840 - US
|
|
data = {
|
|
"shelf": _radio[0],
|
|
"resource": _radio[1],
|
|
"radio": _radio[2],
|
|
"mode": "NA",
|
|
"channel": _channel,
|
|
"country": _country_num
|
|
}
|
|
print(f"Lanforge-radio Country changed {_country_num}")
|
|
self.local_realm.json_post("/cli-json/set_wifi_radio", _data=data)
|
|
|
|
def downlink_mu_mimo(self, radios_2g=[], radios_5g=[], radios_ax=[], dut_name="TIP", dut_5g="", dut_2g="",
|
|
mode="BRIDGE", vlan_id=1, skip_2g=True, skip_5g=False):
|
|
raw_line = []
|
|
skip_twog = '1' if skip_2g else '0'
|
|
skip_fiveg = '1' if skip_5g else '0'
|
|
sniff_radio = 'wiphy0'
|
|
channel = 149 if skip_2g else 11
|
|
upstream_port = self.upstream_port
|
|
|
|
sets = [['Calibrate Attenuators', '0'], ['Receiver Sensitivity', '0'], ['Maximum Connection', '0'],
|
|
['Maximum Throughput', '0'], ['Airtime Fairness', '0'], ['Range Versus Rate', '0'],
|
|
['Spatial Consistency', '0'],
|
|
['Multiple STAs Performance', '0'], ['Multiple Assoc Stability', '0'], ['Downlink MU-MIMO', '1'],
|
|
['AP Coexistence', '0'], ['Long Term Stability', '0'], ['Skip 2.4Ghz Tests', f'{skip_twog}'],
|
|
['Skip 5Ghz Tests', f'{skip_fiveg}'], ['2.4Ghz Channel', 'AUTO'], ['5Ghz Channel', 'AUTO']]
|
|
if len(radios_2g) >= 3 and len(radios_5g) >= 3:
|
|
for i in range(6):
|
|
if i == 0 or i == 2:
|
|
raw_line.append([f'radio-{i}: {radios_5g[0] if i == 0 else radios_5g[1]}'])
|
|
if i == 1 or i == 3:
|
|
raw_line.append([f'radio-{i}: {radios_2g[0] if i == 1 else radios_2g[1]}'])
|
|
if i == 4 or i == 5:
|
|
raw_line.append([f'radio-{i}: {radios_5g[2] if i == 4 else radios_2g[2]}'])
|
|
if len(radios_ax) >= 1:
|
|
temp_ax = str(radios_ax[0]).split(" ")
|
|
if len(temp_ax) == 2:
|
|
sniff_radio = str(temp_ax[1])
|
|
elif skip_2g:
|
|
temp = str(radios_5g[0]).split(" ")
|
|
if len(temp) == 2:
|
|
sniff_radio = str(temp[1])
|
|
elif skip_5g:
|
|
temp = str(radios_2g[0]).split(" ")
|
|
if len(temp) == 2:
|
|
sniff_radio = str(temp[1])
|
|
elif len(radios_2g) >= 2 and len(radios_5g) >= 2 and len(radios_ax) >= 2:
|
|
if len(radios_2g) >= 3 and len(radios_5g) >= 3:
|
|
for i in range(6):
|
|
if i == 0 or i == 2:
|
|
raw_line.append([f'radio-{i}: {radios_5g[0] if i == 0 else radios_5g[1]}'])
|
|
if i == 1 or i == 3:
|
|
raw_line.append([f'radio-{i}: {radios_2g[0] if i == 1 else radios_2g[1]}'])
|
|
if i == 4 or i == 5:
|
|
raw_line.append([f'radio-{i}: {radios_5g[2] if i == 4 else radios_2g[2]}'])
|
|
if len(radios_ax) >= 1:
|
|
temp_ax = str(radios_ax[0]).split(" ")
|
|
if len(temp_ax) == 2:
|
|
sniff_radio = str(temp_ax[1])
|
|
else:
|
|
for i in range(6):
|
|
if i == 0 or i == 2:
|
|
raw_line.append([f'radio-{i}: {radios_5g[0] if i == 0 else radios_5g[1]}'])
|
|
if i == 1 or i == 3:
|
|
raw_line.append([f'radio-{i}: {radios_2g[0] if i == 1 else radios_2g[1]}'])
|
|
if i == 4 or i == 5:
|
|
raw_line.append([f'radio-{i}: {radios_ax[0] if i == 4 else radios_ax[1]}'])
|
|
if len(radios_ax) >= 3:
|
|
temp_ax = str(radios_ax[2]).split(" ")
|
|
if len(temp_ax) == 2:
|
|
sniff_radio = str(temp_ax[1])
|
|
|
|
if len(raw_line) != 6:
|
|
raw_line = [['radio-0: 1.1.5 wiphy1'], ['radio-1: 1.1.4 wiphy0'], ['radio-2: 1.1.7 wiphy3'],
|
|
['radio-3: 1.1.6 wiphy2'], ['radio-4: 1.1.8 wiphy4'], ['radio-5: 1.1.9 wiphy5']]
|
|
instance_name = "tr398-instance-{}".format(str(random.randint(0, 100000)))
|
|
|
|
if not os.path.exists("mu-mimo-config.txt"):
|
|
with open("mu-mimo-config.txt", "wt") as f:
|
|
for i in raw_line:
|
|
f.write(str(i[0]) + "\n")
|
|
f.close()
|
|
|
|
if mode == "BRIDGE" or mode == "NAT":
|
|
upstream_port = self.upstream_port
|
|
else:
|
|
upstream_port = self.upstream_port + "." + str(vlan_id)
|
|
print("Upstream Port: ", self.upstream_port)
|
|
print("radio used to sniff :", sniff_radio)
|
|
self.pcap_obj = LfPcap(host=self.lanforge_ip, port=self.lanforge_port)
|
|
self.cvtest_obj = TR398Test(lf_host=self.lanforge_ip,
|
|
lf_port=self.lanforge_port,
|
|
lf_user="lanforge",
|
|
lf_password="lanforge",
|
|
instance_name=instance_name,
|
|
config_name="cv_dflt_cfg",
|
|
upstream="1.1." + upstream_port,
|
|
pull_report=True,
|
|
local_lf_report_dir=self.local_report_path,
|
|
load_old_cfg=False,
|
|
dut2=dut_2g,
|
|
dut5=dut_5g,
|
|
raw_lines_file="mu-mimo-config.txt",
|
|
enables=[],
|
|
disables=[],
|
|
raw_lines=[],
|
|
sets=sets,
|
|
test_rig=dut_name
|
|
)
|
|
self.cvtest_obj.result = True
|
|
self.cvtest_obj.setup()
|
|
t1 = threading.Thread(target=self.cvtest_obj.run)
|
|
t1.start()
|
|
t2 = threading.Thread(target=self.pcap_obj.sniff_packets, args=(sniff_radio, "mu-mimo", channel, 30))
|
|
if t1.is_alive():
|
|
time.sleep(480)
|
|
t2.start()
|
|
while t1.is_alive():
|
|
time.sleep(1)
|
|
if os.path.exists("mu-mimo-config.txt"):
|
|
os.remove("mu-mimo-config.txt")
|
|
# pull pcap from lanforge to current directory
|
|
if self.pcap_obj.pcap_name is not None:
|
|
lf_report.pull_reports(hostname=self.lanforge_ip, port=self.lanforge_ssh_port, username="lanforge",
|
|
password="lanforge", report_location="/home/lanforge/" + self.pcap_obj.pcap_name,
|
|
report_dir=".")
|
|
else:
|
|
raise ValueError("pcap_name should not be None")
|
|
|
|
table_heads = ["Packet Type", "Capability Check", 'PASS/FAIL']
|
|
table_data = []
|
|
|
|
try:
|
|
if os.path.exists(self.pcap_obj.pcap_name):
|
|
# check for mu-mimo bearmformee association request
|
|
assoc_req = self.pcap_obj.check_beamformee_association_request(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=assoc_req, name="Check Bearmformee Association Request")
|
|
if assoc_req == "MU Beamformee Capable: Supported":
|
|
table_data.append(['Association Request', assoc_req, 'PASS'])
|
|
else:
|
|
table_data.append(['Association Request', assoc_req, 'FAIL'])
|
|
self.cvtest_obj.result = 'FAIL'
|
|
|
|
#check for mu-mimo bearmformer association response
|
|
assoc_res = self.pcap_obj.check_beamformer_association_response(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=assoc_res, name="Check Bearmformer Association Response")
|
|
if assoc_res == "MU Beamformer Capable: Supported":
|
|
table_data.append(['Association Response', assoc_res, 'PASS'])
|
|
else:
|
|
table_data.append(['Association Response', assoc_res, 'FAIL'])
|
|
self.cvtest_obj.result = 'FAIL'
|
|
|
|
# check for mu-mimo bearmformer in beacon frame
|
|
beacon_res = self.pcap_obj.check_beamformer_beacon_frame(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=beacon_res, name="Check Bearmformer in Beacon Frame")
|
|
if beacon_res == "MU Beamformer Capable: Supported":
|
|
table_data.append(['Beacon Frame', beacon_res, 'PASS'])
|
|
else:
|
|
table_data.append(['Beacon Frame', beacon_res, 'FAIL'])
|
|
self.cvtest_obj.result = 'FAIL'
|
|
|
|
# check for mu-mimo bearmformer in probe response
|
|
beacon_res = self.pcap_obj.check_beamformer_probe_response(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=beacon_res, name="Check Bearmformer in Probe Response")
|
|
if beacon_res == "MU Beamformer Capable: Supported":
|
|
table_data.append(['Beacon Frame', beacon_res, 'PASS'])
|
|
else:
|
|
table_data.append(['Beacon Frame', beacon_res, 'FAIL'])
|
|
self.cvtest_obj.result = 'FAIL'
|
|
|
|
# check for Group ID Management in Packet
|
|
group_mgmt = self.pcap_obj.check_group_id_mgmt(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=group_mgmt, name="Check Group ID Management")
|
|
if group_mgmt != "Packet Not Found" or group_mgmt is not None:
|
|
table_data.append(['Group ID Management Frame', group_mgmt, 'PASS'])
|
|
else:
|
|
table_data.append(['Group ID Management Frame', group_mgmt, 'FAIL'])
|
|
self.cvtest_obj.result = 'FAIL'
|
|
|
|
print(table_data)
|
|
# attach test data in a table to allure
|
|
report_obj = Report()
|
|
table_info = report_obj.table2(table=table_data, headers=table_heads)
|
|
allure.attach(name="Test Results Info", body=table_info)
|
|
|
|
# attach pcap file to allure
|
|
allure.attach.file(source=self.pcap_obj.pcap_name,
|
|
name="pcap_file", attachment_type=allure.attachment_type.PCAP)
|
|
except FileNotFoundError:
|
|
print(f"{self.pcap_obj.pcap_name} doesn't exist")
|
|
|
|
report_name = self.cvtest_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
|
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
|
influx_port=self.influx_params["influx_port"],
|
|
influx_org=self.influx_params["influx_org"],
|
|
influx_token=self.influx_params["influx_token"],
|
|
influx_bucket=self.influx_params["influx_bucket"],
|
|
path=report_name)
|
|
influx.glob()
|
|
return self.cvtest_obj
|
|
|
|
def scan_ssid(self, radio=""):
|
|
'''This method for scan ssid data'''
|
|
list_data = []
|
|
obj_scan = StaScan(host=self.lanforge_ip, port=self.lanforge_port, ssid="fake ssid", security="open",
|
|
password="[BLANK]", radio=radio, sta_list=["sta0000"], csv_output="scan_ssid.csv")
|
|
obj_scan.pre_cleanup()
|
|
time1 = datetime.now()
|
|
first = time.mktime(time1.timetuple()) * 1000
|
|
obj_scan.build()
|
|
obj_scan.start()
|
|
time2 = datetime.now()
|
|
second = time.mktime(time2.timetuple()) * 1000
|
|
diff = int(second - first)
|
|
try:
|
|
with open(obj_scan.csv_output, 'r') as file:
|
|
reader = csv.reader(file)
|
|
for row in reader:
|
|
if row[1] == "age":
|
|
list_data.append(row)
|
|
continue
|
|
elif int(row[1]) < diff:
|
|
list_data.append(row)
|
|
except Exception as e:
|
|
print(e)
|
|
report_obj = Report()
|
|
csv_data_table = report_obj.table2(list_data)
|
|
allure.attach(name="scan_ssid_data", body=csv_data_table)
|
|
obj_scan.cleanup()
|
|
return list_data
|
|
|
|
def start_sniffer(self, radio_channel=None, radio=None, test_name="sniff_radio", duration=60):
|
|
self.pcap_name = test_name + ".pcap"
|
|
self.pcap_obj = SniffRadio(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port, radio=radio,
|
|
channel=radio_channel)
|
|
self.pcap_obj.setup(0, 0, 0)
|
|
time.sleep(5)
|
|
self.pcap_obj.monitor.admin_up()
|
|
time.sleep(5)
|
|
self.pcap_obj.monitor.start_sniff(capname=self.pcap_name, duration_sec=duration)
|
|
|
|
def stop_sniffer(self):
|
|
self.pcap_obj.monitor.admin_down()
|
|
time.sleep(2)
|
|
self.pcap_obj.cleanup()
|
|
lf_report.pull_reports(hostname=self.lanforge_ip, port=self.lanforge_ssh_port, username="lanforge",
|
|
password="lanforge",
|
|
report_location="/home/lanforge/" + self.pcap_name,
|
|
report_dir=".")
|
|
allure.attach.file(source=self.pcap_name,
|
|
name="pcap_file", attachment_type=allure.attachment_type.PCAP)
|
|
print("pcap file name : ", self.pcap_name)
|
|
return self.pcap_name
|
|
|
|
def check_ssid_available_scan_result(self, scan_ssid_data=None, ssid=None):
|
|
'''This method will check ssid available or not in scan ssid data'''
|
|
try:
|
|
flag = False
|
|
for i in scan_ssid_data:
|
|
if ssid in i:
|
|
flag = True
|
|
if flag:
|
|
return True
|
|
else:
|
|
return False
|
|
except Exception as e:
|
|
print(e)
|
|
|
|
def country_code_channel_division(self, ssid = "[BLANK]", passkey='[BLANK]', security="wpa2", mode="BRIDGE",
|
|
band='2G', station_name=[], vlan_id=100, channel='1', channel_width=20,
|
|
country_num=392, country='United States(US)'):
|
|
self.local_realm = realm.Realm(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port)
|
|
radio = (self.fiveg_radios[0] if band == "fiveg" else self.twog_radios[0]).split('.')
|
|
self.set_radio_country_channel(_radio=radio,_country_num=country_num)
|
|
station = self.Client_Connect(ssid=ssid, passkey=passkey, security=security, mode=mode, band=band,
|
|
station_name=station_name, vlan_id=vlan_id)
|
|
if station:
|
|
for i in range(10):
|
|
station_info = station.json_get(f"/port/1/1/{station_name[0]}")
|
|
if station_info['interface']['ip'] == '0.0.0.0':
|
|
time.sleep(5)
|
|
else:
|
|
break
|
|
print(f"station {station_name[0]} IP: {station_info['interface']['ip']}\n"
|
|
f"connected channel: {station_info['interface']['channel']}\n"
|
|
f"and expected channel: {channel}")
|
|
allure.attach(name="Definition",
|
|
body="Country code channel test intends to verify stability of Wi-Fi device " \
|
|
"where the AP is configured with different countries with different channels.")
|
|
allure.attach(name="Procedure",
|
|
body=f"This test case definition states that we need to push the basic {mode.lower()} mode config on the AP to "
|
|
f"be tested by configuring it with {country} on {channel_width}MHz channel width and "
|
|
f"channel {channel}. Create a client on {'5' if band=='fiveg' else '2.4'} GHz radio. Pass/ fail criteria: "
|
|
f"The client created on {'5' if band=='fiveg' else '2.4'} GHz radio should get associated to the AP")
|
|
allure.attach(name="Details",
|
|
body=f"Country code : {country[country.find('(')+1:-1]}\n"
|
|
f"Bandwidth : {channel_width}Mhz\n"
|
|
f"Channel : {channel}\n")
|
|
station_data_str = ""
|
|
for i in station_info["interface"]:
|
|
try:
|
|
station_data_str += i + " : " + str(station_info["interface"][i]) + "\n"
|
|
except Exception as e:
|
|
print(e)
|
|
allure.attach(name=str(station_name[0]), body=str(station_data_str))
|
|
station.station_profile.cleanup()
|
|
self.set_radio_country_channel(_radio=radio)
|
|
if station_info['interface']['ip'] and station_info['interface']['channel'] == str(channel):
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def ofdma(self, mode="BRIDGE", vlan_id=1, inst_name="ofdma", batch_size='1', rawlines=None, sniffer_channel=0,
|
|
sniffer_radio="wiphy0", wct_stations=None, sniffer_duration=60):
|
|
|
|
if inst_name == "ofdma":
|
|
inst_name = "ofdma-instance-{}".format(str(random.randint(0, 100000)))
|
|
|
|
if rawlines is None:
|
|
rawlines = [['pdu_sz: 300']]
|
|
|
|
self.pcap_obj = LfPcap(host=self.lanforge_ip, port=self.lanforge_port)
|
|
sniffer = threading.Thread(target=self.pcap_obj.sniff_packets,
|
|
args=(sniffer_radio, "ofdma-test", sniffer_channel, 90))
|
|
sniffer.start()
|
|
ofdma_obj = self.wifi_capacity(instance_name=inst_name, mode=mode, vlan_id=vlan_id, download_rate="10 Mbps",
|
|
batch_size=batch_size, stations=wct_stations, create_stations=False,
|
|
sort="interleave",
|
|
upload_rate="0", protocol="TCP-IPv4", duration="60000", raw_lines=rawlines)
|
|
ofdma_obj.result = 'PASS'
|
|
while sniffer.is_alive():
|
|
time.sleep(1)
|
|
report_name = ofdma_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
|
# pull pcap from lanforge to current directory
|
|
if self.pcap_obj.pcap_name is not None:
|
|
try:
|
|
lf_report.pull_reports(hostname=self.lanforge_ip, port=self.lanforge_ssh_port, username="lanforge",
|
|
password="lanforge", report_location="/home/lanforge/" + self.pcap_obj.pcap_name,
|
|
report_dir=".")
|
|
except Exception as e:
|
|
print("error while pulling pcap file from lanforge", e)
|
|
else:
|
|
raise ValueError("pcap_name should not be None")
|
|
|
|
table_heads = ["Packet Type", "Capability Check", 'PASS/FAIL']
|
|
table_data = []
|
|
|
|
# check for HE Capability in Beacon Frame
|
|
check_he = self.pcap_obj.check_he_capability_beacon_frame(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=check_he, name="Check HE Capabilities in Beacon Frame")
|
|
if check_he == "HE SU PPDU & HE MU PPDU w 4x HE-LTF & 0.8us GI: Supported":
|
|
table_data.append(['Beacon Frame', check_he, 'PASS'])
|
|
else:
|
|
table_data.append(['Beacon Frame', check_he, 'FAIL'])
|
|
ofdma_obj.result = 'FAIL'
|
|
|
|
# check for HE Capability in probe request
|
|
check_he = self.pcap_obj.check_he_capability_probe_request(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=check_he, name="Check HE Capabilities in Probe Request")
|
|
if check_he == "HE SU PPDU & HE MU PPDU w 4x HE-LTF & 0.8us GI: Supported":
|
|
table_data.append(['Probe Request', check_he, 'PASS'])
|
|
else:
|
|
table_data.append(['Probe Request', check_he, 'FAIL'])
|
|
ofdma_obj.result = 'FAIL'
|
|
|
|
# check for HE Capability in probe response
|
|
check_he = self.pcap_obj.check_he_capability_probe_response(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=check_he, name="Check HE Capabilities in Probe Request")
|
|
if check_he == "HE SU PPDU & HE MU PPDU w 4x HE-LTF & 0.8us GI: Supported":
|
|
table_data.append(['Probe Response', check_he, 'PASS'])
|
|
else:
|
|
table_data.append(['Probe Response', check_he, 'FAIL'])
|
|
ofdma_obj.result = 'FAIL'
|
|
|
|
# check for HE Capability in Association request
|
|
check_he = self.pcap_obj.check_he_capability_association_request(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=check_he, name="Check HE Capabilities in Association Request")
|
|
if check_he == "HE SU PPDU & HE MU PPDU w 4x HE-LTF & 0.8us GI: Supported":
|
|
table_data.append(['Association Request', check_he, 'PASS'])
|
|
else:
|
|
table_data.append(['Association Request', check_he, 'FAIL'])
|
|
ofdma_obj.result = 'FAIL'
|
|
|
|
# check for HE Capability in Association response
|
|
check_he = self.pcap_obj.check_he_capability_association_response(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=check_he, name="Check HE Capabilities in Association Response")
|
|
if check_he == "HE SU PPDU & HE MU PPDU w 4x HE-LTF & 0.8us GI: Supported":
|
|
table_data.append(['Association Response', check_he, 'PASS'])
|
|
else:
|
|
table_data.append(['Association Response', check_he, 'FAIL'])
|
|
ofdma_obj.result = 'FAIL'
|
|
|
|
# check for Guard Interval
|
|
check_he = self.pcap_obj.check_he_guard_interval(pcap_file=self.pcap_obj.pcap_name)
|
|
allure.attach(body=check_he, name="Check Guard Interval")
|
|
if check_he == "Packet Not Found" or check_he is None:
|
|
table_data.append(['Guard Interval', check_he, 'FAIL'])
|
|
ofdma_obj.result = 'FAIL'
|
|
else:
|
|
table_data.append(['Guard Interval', check_he, 'PASS'])
|
|
|
|
print(table_data)
|
|
# attach test data in a table to allure
|
|
report_obj = Report()
|
|
table_info = report_obj.table2(table=table_data, headers=table_heads)
|
|
allure.attach(name="Test Results Info", body=table_info)
|
|
|
|
allure.attach.file(source=self.pcap_obj.pcap_name,
|
|
name="pcap_file", attachment_type=allure.attachment_type.PCAP)
|
|
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
|
influx_port=self.influx_params["influx_port"],
|
|
influx_org=self.influx_params["influx_org"],
|
|
influx_token=self.influx_params["influx_token"],
|
|
influx_bucket=self.influx_params["influx_bucket"],
|
|
path=report_name)
|
|
influx.glob()
|
|
return ofdma_obj
|
|
|
|
def set_radio_channel(self, radio="1.1.wiphy0", channel="AUTO"):
|
|
try:
|
|
radio = radio.split(".")
|
|
shelf = radio[0]
|
|
resource = radio[1]
|
|
radio_ = radio[2]
|
|
print("radio %s channel %s" % (radio, channel))
|
|
local_realm_obj = realm.Realm(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port)
|
|
data = {
|
|
"shelf": shelf,
|
|
"resource": resource,
|
|
"radio": radio_,
|
|
"mode": "NA",
|
|
"channel": channel
|
|
}
|
|
local_realm_obj.json_post("/cli-json/set_wifi_radio", _data=data)
|
|
time.sleep(2)
|
|
except Exception as e:
|
|
print(e)
|
|
|
|
def layer3_traffic(self, ssid_num=8, band="2.4 Ghz", station_name=[]):
|
|
self.staConnect = StaConnect2(self.lanforge_ip, self.lanforge_port, debug_=self.debug)
|
|
self.staConnect.station_profile = self.staConnect.new_station_profile()
|
|
self.staConnect.resource = 1
|
|
self.staConnect.station_names = station_name
|
|
self.staConnect.runtime_secs = 40
|
|
self.staConnect.bringup_time_sec = 80
|
|
self.staConnect.cleanup_on_exit = True
|
|
self.staConnect.station_profile.up = True
|
|
self.staConnect.use_existing_sta = True
|
|
allure.attach(name="Definition",
|
|
body="Max-SSID test intends to verify stability of Wi-Fi device " \
|
|
"where the AP is configured with max no.of SSIDs with different security modes.")
|
|
allure.attach(name="Procedure",
|
|
body=f"This test case definition states that we need to push the basic bridge mode config on the "
|
|
f"AP to be tested by configuring it with maximum {ssid_num} SSIDs in {band} radio. "
|
|
f"Create client on each SSIDs and run Layer-3 traffic. Pass/ fail criteria: "
|
|
f"The client created should get associated to the AP")
|
|
# Create UDP endpoints
|
|
self.staConnect.l3_udp_profile = self.staConnect.new_l3_cx_profile()
|
|
self.staConnect.l3_udp_profile.report_timer = 1000
|
|
self.staConnect.l3_udp_profile.name_prefix = "udp"
|
|
self.staConnect.cx_profile.name_prefix = "udp"
|
|
self.staConnect.pre_cleanup()
|
|
self.staConnect.l3_udp_profile.create(endp_type="lf_udp",
|
|
side_a=station_name,
|
|
side_b="%d.%s" % (self.staConnect.resource, self.upstream_port),
|
|
suppress_related_commands=True)
|
|
|
|
# Create TCP endpoints
|
|
self.staConnect.l3_tcp_profile = self.staConnect.new_l3_cx_profile()
|
|
self.staConnect.l3_tcp_profile.report_timer = 1000
|
|
self.staConnect.l3_tcp_profile.name_prefix = "tcp"
|
|
self.staConnect.cx_profile.name_prefix = "tcp"
|
|
self.staConnect.pre_cleanup()
|
|
self.staConnect.l3_tcp_profile.create(endp_type="lf_tcp",
|
|
side_a=station_name,
|
|
side_b="%d.%s" % (self.staConnect.resource, self.upstream_port),
|
|
suppress_related_commands=True)
|
|
self.staConnect.start()
|
|
print("napping %f sec" % self.staConnect.runtime_secs)
|
|
time.sleep(self.staConnect.runtime_secs)
|
|
count = 0
|
|
report_obj = Report()
|
|
for station_info in self.staConnect.resulting_stations:
|
|
data_table, dict_table = "", {}
|
|
dict_data = self.staConnect.resulting_stations[station_info]["interface"]
|
|
dict_table["Interface"] = list(dict_data.keys())
|
|
dict_table["Value"] = list(dict_data.values())
|
|
try:
|
|
data_table = report_obj.table2(table=dict_table, headers='keys')
|
|
except Exception as e:
|
|
print(e)
|
|
allure.attach(name=str(self.staConnect.resulting_stations[station_info]["interface"]['alias']), body=data_table)
|
|
data_table = ""
|
|
dict_table.clear()
|
|
cx = list(self.staConnect.l3_tcp_profile.created_cx.keys())[count]
|
|
dict_data = self.staConnect.json_get(f"/cx/{cx}")
|
|
dict_table["Cross-connect"] = list(dict_data[cx].keys())
|
|
dict_table["tcp-Value"] = list(dict_data[cx].values())
|
|
try:
|
|
data_table = report_obj.table2(table=dict_table, headers='keys')
|
|
except Exception as e:
|
|
print(e)
|
|
cx = list(self.staConnect.l3_udp_profile.created_cx.keys())[count]
|
|
dict_data = self.staConnect.json_get(f"/cx/{cx}")
|
|
dict_table["udp-Value"] = list(dict_data[cx].values())
|
|
try:
|
|
data_table = report_obj.table2(table=dict_table, headers='keys')
|
|
except Exception as e:
|
|
print(e)
|
|
allure.attach(name="cx-" + str(self.staConnect.resulting_stations[station_info]["interface"]['alias']), body=str(data_table))
|
|
count += 1
|
|
self.staConnect.stop()
|
|
self.staConnect.cleanup()
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
influx_host = "influx.cicd.lab.wlan.tip.build"
|
|
influx_port = 80
|
|
influx_token = "TCkdATXAbHmNbn4QyNaj43WpGBYxFrzV"
|
|
influx_bucket = "tip-cicd"
|
|
influx_org = "tip"
|
|
influx_params = {
|
|
"influx_host": influx_host,
|
|
"influx_port": influx_port,
|
|
"influx_token": influx_token,
|
|
"influx_bucket": influx_bucket,
|
|
"influx_org": influx_org,
|
|
"influx_tag": ["basic-03", "ec420"],
|
|
}
|
|
lanforge_data = {
|
|
"ip": "10.28.3.6",
|
|
"port": 8080,
|
|
"ssh_port": 22,
|
|
"2.4G-Radio": ["1.1.wiphy4"],
|
|
"5G-Radio": ["1.1.wiphy5"],
|
|
"AX-Radio": ["1.1.wiphy0", "1.1.wiphy1", "1.1.wiphy2", "1.1.wiphy3"],
|
|
"upstream": "1.1.eth2",
|
|
"upstream_subnet": "10.28.2.1/24",
|
|
"uplink": "1.1.eth3",
|
|
"2.4G-Station-Name": "wlan0",
|
|
"5G-Station-Name": "wlan1",
|
|
"AX-Station-Name": "ax"
|
|
}
|
|
obj = RunTest(lanforge_data=lanforge_data, debug=False, influx_params=influx_params)
|
|
upstream = lanforge_data['upstream']
|
|
# data = obj.staConnect.json_get("/port/all")
|
|
obj.eap_connect.admin_down("1.1.wiphy4")
|
|
obj.eap_connect.admin_up("1.1.wiphy4")
|
|
# print(dict(list(data['interfaces'])).keys())
|
|
# print(obj.staConnect.json_get("/port/" + upstream.split(".")[0] +
|
|
# "/" + upstream.split(".")[1] +
|
|
# "/" + upstream.split(".")[2] + "/" + "10"))
|
|
# print("/port/" + upstream.split(".")[0] +
|
|
# "/" + upstream.split(".")[1] +
|
|
# "/" + upstream.split(".")[2] + "/" + "100")
|
|
# obj.Client_Connect(ssid="ssid_wpa_5g_br", passkey="something", security="wpa", station_name=['sta0000'])
|
|
# obj.dataplane(station_name=["sta0000"])
|
|
# a = obj.staConnect.json_get("/events/since/")
|
|
# print(a)
|
|
# print(obj.eap_connect.json_get("port/1/1/sta0000?fields=ap,ip"))
|
|
# obj.EAP_Connect(station_name=["sta0000", "sta0001"], eap="TTLS", ssid="testing_radius")
|